Secure shell commands, Secure shell commands -36 – Asus GigaX2024SX User Manual

Page 204

Advertising
background image

Secure Shell Commands

y-standard includes remote access tools originally designed for Unix

systems. Some of these tools have also been implemented for Microsoft Windows

nts. These tools, including commands such as rlogin (remote

The Secure Shell (SSH) includes server/client applications intended as a secure
replacement for the older Berkley remote access tools. SSH can also provide
re

et.

W
pu
for access authentication. SSH also encrypts all data transfers passing between

SH-enabled management station clients, and ensures that data

This section describes the commands used to configure the SSH server. However,

ou also need to install a SSH client on the management station when

using this protocol to configure the switch.

both SSH Version 1.5 and 2.0.

The Berkle

and other environme
login), rsh (remote shell), and rcp (remote copy), are not secure from hostile
attacks.

mote management access to this switch as a secure replacement for Teln

hen a client contacts the switch via the SSH protocol, the switch uses a

blic-key that the client must match along with a local user name and password

the switch and S
traveling over the network arrives unaltered.

note that y

Note: The switch supports

4-36

Advertising