SMC Networks TIGERSWITCH SMC6752AL2 ユーザーズマニュアル

ページ / 516
C
OMMAND
 L
INE
 I
NTERFACE
4-46
Secure Shell Commands
The Berkley-standard includes remote access tools originally designed for 
Unix systems. Some of these tools have also been implemented for 
Microsoft Windows and other environments. These tools, including 
commands such as rlogin (remote login), rsh (remote shell), and rcp (remote 
copy), are not secure from hostile attacks. 
The Secure Shell (SSH) includes server/client applications intended as a 
secure replacement for the older Berkley remote access tools. SSH can also 
provide remote management access to this switch as a secure replacement 
for Telnet. When a client contacts the switch via the SSH protocol, the 
switch uses a public-key that the client must match along with a local user 
name and password for access authentication. SSH also encrypts all data 
transfers passing between the switch and SSH-enabled management 
station clients, and ensures that data traveling over the network arrives 
unaltered.
This section describes the commands used to configure the SSH server. 
However, note that you also need to install a SSH client on the 
management station when using this protocol to configure the switch. 
Note: The switch supports both SSH Version 1.5 and 2.0.
Table 4-15  SSH Commands
Command
Function
Mode
Page
ip ssh server
Enables the SSH server on the switch 
GC
ip ssh timeout
Specifies the authentication timeout for the 
SSH server
GC
ip ssh 
authentication-retries
Specifies the number of retries allowed by 
a client 
GC
ip ssh server-key size Sets the SSH server key size
GC
copy tftp public-key Copies the user’s public key from a TFTP 
server to the switch 
PE
delete public-key
Deletes the public key for the specified 
user
PE