S
YSTEM
M
ANAGEMENT
C
OMMANDS
4-45
Default Setting
23
Command Mode
Global Configuration
Example
Secure Shell Commands
The Berkley-standard includes remote access tools originally designed for
Unix systems. Some of these tools have also been implemented for
Microsoft Windows and other environments. These tools, including
commands such as
rlogin
(remote login),
rsh
(remote shell), and
rcp
(remote
copy), are not secure from hostile attacks.
The Secure Shell (SSH) includes server/client applications intended as a
secure replacement for the older Berkley remote access tools. SSH can also
provide remote management access to this switch as a secure replacement
for Telnet. When a client contacts the switch via the SSH protocol, the
switch uses a public-key that the client must match along with a local user
name and password for access authentication. SSH also encrypts all data
transfers passing between the switch and SSH-enabled management
station clients, and ensures that data traveling over the network arrives
unaltered.
This section describes the commands used to configure the SSH server.
However, note that you also need to install an SSH client on the
management station when using this protocol to configure the switch.
Console(config)#ip telnet port 123
Console(config)#
Содержание 6152L2
Страница 2: ......
Страница 18: ...TABLES xiv ...
Страница 32: ...INTRODUCTION 1 10 ...
Страница 46: ...INITIAL CONFIGURATION 2 14 ...
Страница 185: ...PORT CONFIGURATION 3 139 Figure 3 61 Displaying Etherlike and RMON Statistics ...
Страница 249: ...QUALITY OF SERVICE 3 203 Figure 3 90 Configuring Policy Maps ...
Страница 290: ...CONFIGURING THE SWITCH 3 244 ...
Страница 303: ...COMMAND GROUPS 4 13 VC VLAN Database Configuration ...
Страница 434: ...COMMAND LINE INTERFACE 4 144 ...
Страница 568: ...TROUBLESHOOTING B 4 ...
Страница 581: ......