beautypg.com

Chapter 52: secure shell (ssh) introduction, Chapter 52, Secure shell (ssh) introduction – Allied Telesis AlliedWare Plus Operating System Version 5.4.4C (x310-26FT,x310-26FP,x310-50FT,x310-50FP) User Manual

Page 1367: Chapter 52 secure shell (ssh) introduction

background image

Software Reference for x310 Series Switches

C613-50046-01 REV A

AlliedWare Plus

TM

Operating System - Version 5.4.4C

52.1

Chapter 52: Secure Shell (SSH) Introduction

Introduction ........................................................................................................................................ 52.2

Secure Shell on the AlliedWare Plus

OS............................................................................. 52.2

Configuring the SSH Server ........................................................................................................... 52.4

Creating a Host Key................................................................................................................... 52.4
Enabling the Server ................................................................................................................... 52.4
Modifying the Server ................................................................................................................ 52.5
Validating the Server Configuration ................................................................................... 52.6
Adding SSH Users ...................................................................................................................... 52.6
Authenticating SSH Users ....................................................................................................... 52.7
Adding a Login Banner ............................................................................................................ 52.7
Monitoring the Server and Managing Sessions.............................................................. 52.8
Debugging the Server.............................................................................................................. 52.8

Configuring the SSH Client............................................................................................................ 52.9

Modifying the Client ................................................................................................................. 52.9
Adding SSH Servers.................................................................................................................52.10
Authenticating with a Server...............................................................................................52.10
Connecting to a Server and Running Commands .......................................................52.11
Copying files to and from the Server ................................................................................52.11
Debugging the Client.............................................................................................................52.11