beautypg.com

Table 4-15 secure shell commands -45 – SMC Networks SMC TigerStack 1000 SMC8748M User Manual

Page 317

background image

S

YSTEM

M

ANAGEMENT

C

OMMANDS

4-45

The Secure Shell (SSH) includes server/client applications intended as a
secure replacement for the older Berkley remote access tools. SSH can also
provide remote management access to this switch as a secure replacement
for Telnet. When a client contacts the switch via the SSH protocol, the
switch uses a public-key that the client must match along with a local user
name and password for access authentication. SSH also encrypts all data
transfers passing between the switch and SSH-enabled management
station clients, and ensures that data traveling over the network arrives
unaltered.

This section describes the commands used to configure the SSH server.
However, note that you also need to install an SSH client on the
management station when using this protocol to configure the switch.

Note: The switch supports both SSH Version 1.5 and 2.0.

Table 4-15 Secure Shell Commands

Command

Function

Mode Page

ip ssh server

Enables the SSH server on the switch

GC

4-48

ip ssh timeout

Specifies the authentication timeout for the
SSH server

GC

4-49

ip ssh
authentication-retries

Specifies the number of retries allowed by a
client

GC

4-50

ip ssh server-key size Sets the SSH server key size

GC

4-50

copy tftp public-key Copies the user’s public key from a TFTP

server to the switch

PE

4-84

delete public-key

Deletes the public key for the specified user PE

4-51

ip ssh crypto
host-key generate

Generates the host key

PE

4-51

ip ssh crypto zeroize Clear the host key from RAM

PE

4-52

ip ssh save host-key Saves the host key from RAM to flash

memory

PE

4-53

disconnect

Terminates a line connection

PE

4-23

This manual is related to the following products: