GarrettCom MNS-6K-SECURE 14.1.4 Manual Do Utilizador

Página de 364
M A G N U M   6 K   S W I T C H E S ,     M N S - 6 K   U S E R   G U I D E  
 
 
Magnum6K25# 
user
 
Magnum6K25(user)## 
useraccess user=peter service=telnet enable 
  Telnet Access Enabled. 
Magnum6K25(user)## 
exit
 
 
Magnum6K25# 
show session
 
Current Sessions: 
 
  SL  # Session Id  
Connection      User Name   
User Mode 
    1   
1           
163.10.10.14      manager   
Manager 
   2   
2           
163.11.11.15      peter        
Manager 
    3    
3           
163.12.12.16      operator     
Operator 
Magnum6K25# 
kill session id=3 
  Session Terminated. 
Magnum6K25# 
F
IGURE 
27 – managing and viewing multiple telnet sessions 
In the above example, the user with user-id peter is given telnet access (which was disabled earlier in 
Chapter 2). Then multiple users telnet into the switch. This is shown using the “show session” 
command. The user operator session is then terminated using the “kill session” command. 
 
 
The default port – port 23 is used for telnet. 
 
A maximum of four simultaneous telnet sessions are allowed at any time on the 
switch. The commands in these telnet windows are executed in a round robin – i.e. 
if one window takes a long time to finish a command, the other windows may 
encounter a delay before the command is completed. For example, if one window 
is executing a file download, the other windows will not be able to execute the 
command before the file transfer is completed. Another example, if a outbound 
telnet session is started from the switch (through a telnet window) then the other 
windows will not be able to execute a command till the telnet session is completed. 
 
Using SSH 
 
 
SSH is available in MNS-6K-SECURE.  
 
 
The Telnet, rlogin, rcp, rsh commands have a number of security weakness: all 
communications are in clear text and no machine authentication takes place. These 
commands are open to eavesdropping and tcp/ip address spoofing.  Secure Shell or 
SSH is a network protocol that allows data to be exchanged over a secure channel 
between two computers. SSH uses public/private key RSA authentication to check 
the identity of communicating peer machines, encryption of all data exchanged (with 
44