2 ssh server configuration task list – Accton Technology ES4626 User Manual
Page 52

52
SSH (Secure Shell) is a protocol which ensures a secure remote access connection
to network devices. It is based on the reliable TCP/IP protocol. By conducting the
mechanism such as key distribution, authentication and encryption between SSH server
and SSH client, a secure connection is established. The information transferred on this
connection is protected from being intercepted and decrypted. The switch meets the
requirements of SSH2.0. It supports SSH2.0 client software such as SSH Secure Client
and putty. Users can run the above software to manage the switch remotely.
The switch presently supports RSA authentication, 3DES cryptography protocol and
SSH user password authentication etc.
2.2.4.2 SSH Server Configuration Task List
1. SSH Server Configuration
Command Explanation
Global Mode
ssh-server enable
no ssh-server enable
Enable SSH function on the switch; the
“no ssh-server enable” command
disables SSH function.
ssh-user
no ssh-user
Configure the username and password of
SSH client software for logging on the
switch; the “no ssh-user
“ command deletes the
username.
ssh-server timeout
no ssh-server timeout
Configure timeout value for SSH
authentication; the “no ssh-server
timeout
” command restores the default
timeout value for SSH authentication.
ssh-server authentication-retires <
authentication-retires>
no ssh-server authentication-retries
Configure the number of times for
retrying SSH authentication; the “no
ssh-server authentication-retries
”
command restores the default number of
times for retrying SSH authentication.
ssh-server host-key create rsa
modulus
Generate the new RSA host key on the
SSH server.
Admin Mode
monitor
no monitor
Display SSH debug information on the
SSH client side; the “no monitor”
command stops displaying SSH debug
information on the SSH client side.