53
2.2.4 SSH
2.2.4.1 Introduction to SSH
SSH (Secure Shell) is a protocol which ensures a secure remote access connection
to network devices. It is based on the reliable TCP/IP protocol. By conducting the
mechanism such as key distribution, authentication and encryption between SSH server
and SSH client, a secure connection is established. The information transferred on this
connection is protected from being intercepted and decrypted. The switch meets the
requirements of SSH2.0. It supports SSH2.0 client software such as SSH Secure Client
and putty. Users can run the above software to manage the switch remotely.
The switch presently supports RSA authentication, 3DES cryptography protocol and
SSH user password authentication etc.
2.2.4.2 SSH Server Configuration Task List
1. SSH Server Configuration
Command Explanation
Global Mode
ssh-server enable
no ssh-server enable
Enable SSH function on the switch; the
“
no ssh-server enable
” command
disables SSH function.
ssh-user <user-name> password {0|7}
<password>
no ssh-user <user-name>
Configure the username and password of
SSH client software for logging on the
switch; the “
no ssh-user
<user-name>
“ command deletes the
username.
ssh-server timeout <timeout>
no ssh-server timeout
Configure timeout value for SSH
authentication; the “
no ssh-server
timeout
” command restores the default
timeout value for SSH authentication.
ssh-server authentication-retires <
authentication-retires>
no ssh-server authentication-retries
Configure the number of times for
retrying SSH authentication; the “
no
ssh-server authentication-retries
”
command restores the default number of
times for retrying SSH authentication.
ssh-server host-key create rsa
modulus <moduls>
Generate the new RSA host key on the
SSH server.