5 telnet-server securityip, 6 telnet-user, 3 ssh – Amer Networks SS2R48G4i V2 User Manual

Page 51: 1 introduction to ssh, 2 ssh server configuration task list

Advertising
background image

SS2R24G4i/SS2R48G4i

40

disables the Telnet function in the switch.

Default

Telnet server function is enabled by default.

Command mode

Global Mode

5.2.2.3.5 telnet-server securityip

Command telnet-server securityip <ip-addr>

no telnet-server securityip <ip-addr>

Function

Configure the secure IP address of Telnet client allowed to login to the switch; the “no

telnet-server securityip <ip-addr>

command deletes the authorized Telnet secure address.

Parameter <ip-addr>

is the secure IP address allowed to access the switch, in dot decimal format.

Default

no secure IP address is set by default.

Command mode

Global Mode

5.2.2.3.6 telnet-user

Command telnet-user <username> password {0|7} <password>
no telnet-user <username>
Function

to configure user names and passwords of Telnet clients. Use the “no telnet-user

<username>

” command to remove the Telnet users.

Parameter <username>is the

Telnet client user name. The maximum length may not exceed 16

characters; <password>is the login password, the maximum length may not exceed 8 characters; 0|7
part means as passwords displayed not encrypted or encrypted

Command mode

global configuration mode

Default

The default system does not configure Telnet client user name and password.

5.2.3 SSH

5.2.3.1 Introduction to SSH

SSH (Secure Shell) is a protocol which ensures a secure remote access connection to network

devices. It is based on the reliable TCP/IP protocol. By conducting the mechanism such as key
distribution, authentication and encryption between SSH server and SSH client, a secure connection is
established. The information transferred on this connection is protected from being intercepted and
decrypted. The switch meets the requirements of SSH2.0. It supports SSH2.0 client software such as
SSH Secure Client and putty. Users can run the above software to manage the switch remotely.

The switch presently supports RSA authentication, 3DES cryptography protocol and SSH user

password authentication etc.

5.2.3.2 SSH Server Configuration Task List

Advertising