beautypg.com

Using ssh, Igure, 27 – managing and viewing multiple telnet sessions – GarrettCom MNS-6K 4.1.4 User Manual

Page 45

background image

M A G N U M 6 K S W I T C H E S , M N S - 6 K U S E R G U I D E

Magnum6K25#

user

Magnum6K25(user)##

useraccess user=peter service=telnet enable

Telnet Access Enabled.
Magnum6K25(user)##

exit


Magnum6K25#

show session

Current Sessions:

SL # Session Id

Connection User Name

User Mode

1

1

163.10.10.14 manager

Manager

2

2

163.11.11.15 peter

Manager

3

3

163.12.12.16 operator

Operator

Magnum6K25#

kill session id=3

Session Terminated.
Magnum6K25#

F

IGURE

27 – managing and viewing multiple telnet sessions

In the above example, the user with user-id peter is given telnet access (which was disabled earlier in
Chapter 2). Then multiple users telnet into the switch. This is shown using the “show session”
command. The user operator session is then terminated using the “kill session” command.

The default port – port 23 is used for telnet.

A maximum of four simultaneous telnet sessions are allowed at any time on the
switch. The commands in these telnet windows are executed in a round robin – i.e.
if one window takes a long time to finish a command, the other windows may
encounter a delay before the command is completed. For example, if one window
is executing a file download, the other windows will not be able to execute the
command before the file transfer is completed. Another example, if a outbound
telnet session is started from the switch (through a telnet window) then the other
windows will not be able to execute a command till the telnet session is completed.

Using SSH

SSH is available in MNS-6K-SECURE.


The Telnet, rlogin, rcp, rsh commands have a number of security weakness: all
communications are in clear text and no machine authentication takes place. These
commands are open to eavesdropping and tcp/ip address spoofing. Secure Shell or
SSH is a network protocol that allows data to be exchanged over a secure channel
between two computers. SSH uses public/private key RSA authentication to check
the identity of communicating peer machines, encryption of all data exchanged (with

44

This manual is related to the following products: