42
connection is protected from being intercepted and decrypted. The switch meets the
requirements of SSH2.0. It supports SSH2.0 client software such as SSH Secure Client
and putty. Users can run the above software to manage the switch remotely.
The switch presently supports RSA authentication, 3DES cryptography protocol and
SSH user password authentication etc.
2.2.3.2 SSH Server Configuration Sequence
1. SSH Server Configuration
Command Explanation
Global Mode
ssh-server enable
no ssh-server enable
Enable SSH function on the switch; the
no ssh-server enable” command
disables SSH function.
ssh-user <user-name> password {0|7}
<password>
no ssh-user <user-name>
Configure the username and password of
SSH client software for logging on the
switch; the “no ssh-user <user-name>
command deletes the username.
ssh-server timeout <timeout>
no ssh-server timeout
Configure timeout value for SSH
authentication; the “no ssh-server
timeout” command restores the default
timeout value for SSH authentication.
ssh-server authentication-retires <
authentication-retires>
no ssh-server authentication-retries
Configure the number of times for retrying
SSH authentication; the “no ssh-server
authentication-retries” command
restores the default number of times for
retrying SSH authentication.
ssh-server host-key create rsa
modulus <moduls>
Generate the new RSA host key on the
SSH server.
Admin Mode
monitor
no monitor
Display SSH debug information on the
SSH client side; the “no monitor
command stops displaying SSH debug
information on the SSH client side.
2.2.3.3 SSH Configuration Commands