beautypg.com

Using the ssh command – Juniper Networks J-Series User Manual

Page 47

background image

To escape from the Telnet session to the Telnet command prompt, press Ctrl-]. To
exit from the Telnet session and return to the CLI command prompt, enter

quit

.

Table 19 on page 25 describes the

telnet

command options. For more information,

see the JUNOS System Basics and Services Command Reference.

Table 19: CLI telnet Command Options

Description

Option

Use an 8-bit data path.

8bit

Bypass the routing tables and open a Telnet session only to hosts on directly attached
interfaces. If the host is not on a directly attached interface, an error message is
returned.

bypass-routing

Open a Telnet session to the specified hostname or IP address.

host

Force the Telnet session to an IPv4 destination.

inet

Open a Telnet session to a host on the specified interface. If you do not include this
option, all interfaces are used.

interface source-interface

Suppress the display of symbolic names.

no-resolve

Specify the port number or service name on the host.

port port

Use the specified routing instance for the Telnet session.

routing-instance routing-instance-name

Use the specified source address for the Telnet session.

source address

Using the ssh Command

You can use the CLI

ssh

command to use the secure shell (SSH) program to open a

connection to a remote device:

user@host> ssh host <bypass-routing> <inet> <interface interface-name>
<routing-instance routing-instance-name> <source address> <v1> <v2>

Table 20 on page 25 describes the

ssh

command options. For more information,

see the JUNOS System Basics and Services Command Reference.

Table 20: CLI ssh Command Options

Description

Option

Bypass the routing tables and open an SSH connection only to hosts on directly attached
interfaces. If the host is not on a directly attached interface, an error message is
returned.

bypass-routing

Open an SSH connection to the specified hostname or IP address.

host

Force the SSH connection to an IPv4 destination.

inet

Accessing Remote Devices with the CLI

25

Chapter 1: Managing User Authentication and Access