SYSTEM MANAGEMENT COMMANDS

Secure Shell Commands

The Berkley-standard includes remote access tools originally designed for Unix systems. Some of these tools have also been implemented for Microsoft Windows and other environments. These tools, including commands such as rlogin (remote login), rsh (remote shell), and rcp (remote copy), are not secure from hostile attacks.

The Secure Shell (SSH) includes server/client applications intended as a secure replacement for the older Berkley remote access tools. SSH can also provide remote management access to this switch as a secure replacement for Telnet. When a client contacts the switch via the SSH protocol, the switch uses a public-key that the client must match along with a local user name and password for access authentication. SSH also encrypts all data transfers passing between the switch and SSH-enabled management station clients, and ensures that data traveling over the network arrives unaltered.

This section describes the commands used to configure the SSH server. However, note that you also need to install an SSH client on the management station when using this protocol to configure the switch.

Note: The switch supports both SSH Version 1.5 and 2.0.

Table 4-12. Secure Shell Commands

Command

Function

Mode

Page

ip ssh server

Enables the SSH server on the switch

GC

4-48

 

 

 

 

ip ssh timeout

Specifies the authentication timeout for the

GC

4-49

 

SSH server

 

 

 

 

 

 

ip ssh

Specifies the number of retries allowed by a

GC

4-50

authentication-retries

client

 

 

 

 

 

 

ip ssh server-key size

Sets the SSH server key size

GC

4-51

 

 

 

 

copy tftp public-key

Copies the user’s public key from a TFTP

PE

4-86

 

server to the switch

 

 

 

 

 

 

delete public-key

Deletes the public key for the specified user

PE

4-51

 

 

 

 

4-45

Page 289
Image 289
SMC Networks SMC8624/48T manual Secure Shell Commands