User's Manual

Table Of Contents
Advanced Configuration
6-11
6
SSH Settings
Telnet is a remote management tool that can be used to configure the access point
from anywhere in the network. However, Telnet is not secure from hostile attacks.
The Secure Shell (SSH) can act as a secure replacement for Telnet. The SSH
protocol uses generated public keys to encrypt all data transfers passing between
the access point and SSH-enabled management station clients and ensures that
data traveling over the network arrives unaltered. Clients can then securely use the
local user name and password for access authentication.
Note that SSH client software needs to be installed on the management station to
access the access point for management via the SSH protocol.
Notes: 1. The access point supports only SSH version 2.0.
2. After boot up, the SSH server needs about two minutes to generate host
encryption keys. The SSH server is disabled while the keys are being
generated.
SSH Settings
SSH Server Status: Enables or disables the SSH server. (Default: Enabled)
SSH Server Port: Sets the UDP port for the SSH server. (Range: 1-65535;
Default: 22)
CLI Commands for SSH – To enable the SSH server, use the ip ssh-server enable
command from the CLI Ethernet interface configuration mode. To set the SSH
server UDP port, use the ip ssh-server port command. To view the current settings,
use the show system command from the CLI Exec mode (not shown in the
following example).
Enterprise AP(if-ethernet)#ip ssh-server enable 7-16
Enterprise AP(if-ethernet)#ip ssh-server port 1124 7-16
Enterprise AP(if-ethernet)#exit
Enterprise AP(if-ethernet)#configure