Raisecom
ISCOM2600G-HI (A) Series Configuration Guide
1 Basic configurations
Raisecom Proprietary and Confidential
Copyright © Raisecom Technology Co., Ltd.
14
Telnet Client: when you connect to the ISCOM2600G-HI series switch through the PC
terminal emulation program or Telnet client program on a PC, then telnet other
ISCOM2600G-HI series switch and configure/manage them. As shown in Figure 1-4,
Switch A not only acts as Telnet server but also provides Telnet client service.
Figure 1-4
Networking with device as Telnet client
Configure Telnet Client device as below.
Step
Command
Description
1
Raisecom#telnet {
ip-address
|
ipv6-address
}
[ port
port-id
]
Raisecom#telnet
ipv4-address
[ port
port-id
]
[ sourceip
source-ip-address
]
Log in to another
device through
Telnet.
1.2.4 Accessing through SSH
Telnet is lack of security authentication and it transports messages through Transmission
Control Protocol (TCP) which exists with big potential security hazard. Telnet service may
cause hostile attacks, such as Deny of Service (DoS), host IP spoofing, and routing spoofing.
The traditional Telnet and File Transfer Protocol (FTP) transmit password and data in plain
text, which cannot satisfy users' security demands. SSHv2 is a network security protocol,
which can effectively prevent the disclosure of information in remote management through
data encryption, and provides greater security for remote login and other network services in
network environment.
SSHv2 allows data to be exchanged through TCP and it establishes a secure channel over TCP.
Besides, SSHv2 supports other service ports besides standard port 22, avoiding illegal attacks
from the network.
Before accessing the ISCOM2600G-HI series switch through SSHv2, you must log in to the
ISCOM2600G-HI series switch through the Console interface and start SSH service.
Default configurations for accessing the ISCOM2600G-HI series switch through SSHv2 are
as below.
Function
Default value
SSH server status
Disable
Local SSH key pair length
512 bits
Key renegotiation period
0h
SSH authentication method
password