4 Command Line Interface

Related Commands

ip telnet port (4-45)

Secure Shell Commands

The Berkley-standard includes remote access tools originally designed for Unix systems. Some of these tools have also been implemented for Microsoft Windows and other environments. These tools, including commands such as rlogin (remote login), rsh (remote shell), and rcp (remote copy), are not secure from hostile attacks.

The Secure Shell (SSH) includes server/client applications intended as a secure replacement for the older Berkley remote access tools. SSH can also provide remote management access to this switch as a secure replacement for Telnet. When a client contacts the switch via the SSH protocol, the switch uses a public-key that the client must match along with a local user name and password for access authentication. SSH also encrypts all data transfers passing between the switch and SSH-enabled management station clients, and ensures that data traveling over the network arrives unaltered.

This section describes the commands used to configure the SSH server. However, note that you also need to install a SSH client on the management station when using this protocol to configure the switch.

Note: The switch supports both SSH Version 1.5 and 2.0.

Table 4-16 SSH Commands

Command

Function

Mode

Page

ip ssh server

Enables the SSH server on the switch

GC

4-48

 

 

 

 

ip ssh timeout

Specifies the authentication timeout for the SSH server

GC

4-49

 

 

 

 

ip ssh

Specifies the number of retries allowed by a client

GC

4-49

authentication-retries

 

 

 

ip ssh server-key size

Sets the SSH server key size

GC

4-50

 

 

 

 

copy tftp public-key

Copies the user’s public key from a TFTP server to the switch

PE

4-85

 

 

 

 

delete public-key

Deletes the public key for the specified user

PE

4-50

 

 

 

 

ip ssh crypto host-key

Generates the host key

PE

4-51

generate

 

 

 

ip ssh crypto zeroize

Clear the host key from RAM

PE

4-51

 

 

 

 

ip ssh save host-key

Saves the host key from RAM to flash memory

PE

4-52

 

 

 

 

disconnect

Terminates a line connection

PE

4-20

 

 

 

 

show ip ssh

Displays the status of the SSH server and the configured values

PE

4-52

 

for authentication timeout and retries

 

 

show ssh

Displays the status of current SSH sessions

PE

4-53

 

 

 

 

show public-key

Shows the public key for the specified user or for the host

PE

4-54

 

 

 

 

show users

Shows SSH users, including privilege level and public key type

PE

4-82

 

 

 

 

4-46

Page 342
Image 342
Accton Technology ES3528M-SFP manual Secure Shell Commands, Ip telnet port, SSH Commands Function Mode