Secure shell commands, Table 4-14 – Alcatel Carrier Internetworking Solutions OmniStack 6300-24 User Manual

Page 244

Advertising
background image

Command Line Interface

4-32

4

Command Usage

• You cannot configure the HTTP and HTTPS servers to use the same port.
• If you change the HTTPS port number, clients attempting to connect to the

HTTPS server must specify the port number in the URL, in this format:
https://device:port_number

Example

Related Commands

ip http secure-server (4-30)

Secure Shell Commands

The Berkley-standard includes remote access tools originally designed for Unix
systems. Some of these tools have also been implemented for Microsoft Windows
and other environments. These tools, including commands such as rlogin (remote
login), rsh (remote shell), and rcp (remote copy), are not secure from hostile attacks.

The Secure Shell (SSH) includes server/client applications intended as a secure
replacement for the older Berkley remote access tools. SSH can also provide
remote management access to this switch as a secure replacement for Telnet.
When a client contacts the switch via the SSH protocol, the switch uses a public-key
that the client must match along with a local user name and password for access
authentication. SSH also encrypts all data transfers passing between the switch and
SSH-enabled management station clients, and ensures that data traveling over the
network arrives unaltered.

This section describes the commands used to configure the SSH server. However,
note that you also need to install a SSH client on the management station when
using this protocol to configure the switch.

Note: The switch supports both SSH Version 1.5 and 2.0.

Console(config)#ip http secure-port 1000
Console(config)#

Table 4-14. Secure Shell Commands

Command

Function

Mode

Page

ip ssh server

Enables the SSH server on the switch

GC

4-34

ip ssh timeout

Specifies the authentication timeout for the SSH server

GC

4-35

ip ssh

authentication-retries

Specifies the number of retries allowed by a client

GC

4-36

ip ssh server-key size Sets the SSH server key size

GC

4-36

copy tftp public-key

Copies the user’s public key from a TFTP server to the switch PE

4-62

delete public-key

Deletes the public key for the specified user

PE

4-37

ip ssh crypto host-key

generate

Generates the host key

PE

4-37

ip ssh crypto zeroize

Clear the host key from RAM

PE

4-38

ip ssh save host-key

Saves the host key from RAM to flash memory

PE

4-38

Advertising