Specifications
System Management Commands
3-29
3
Related Commands
ip http secure-server (3-27)
Secure Shell Commands
The Berkley-standard includes remote access tools originally designed for Unix
systems. Some of these tools have also been implemented for Microsoft Windows
and other environments. These tools, including commands such as rlogin (remote
login), rsh (remote shell), and rcp (remote copy), are not secure from hostile attacks.
The Secure Shell (SSH) includes server/client applications intended as a secure
replacement for the older Berkley remote access tools. SSH can also provide
remote management access to this switch as a secure replacement for Telnet.
When a client contacts the switch via the SSH protocol, the switch uses a public-key
that the client must match along with a local user name and password for access
authentication.
This section describes the commands used to configure the SSH server. However,
note that you also need to install a SSH client on the management station when
using this protocol to configure the switch.
Note: The switch supports only SSH Version 1.5.
ip ssh server
Use this command to enable the Secure Shell (SSH) server on this switch. Use the
no form to disable this service.
Syntax
ip ssh server
no ip ssh server
Default Setting
Disabled
Command Mode
Global Configuration
Table 3-24 Secure Shell Commands
Command Function Mode Page
ip ssh server Enables the SSH server on the switch GC 3-29
ip ssh timeout Specifies the authentication timeout for the SSH server GC 3-30
ip ssh
authentication-retries
Specifies the number of retries allowed by a client GC 3-31
show ip ssh Displays the status of the SSH server and the configured values
for authentication timeout and retries
PE 3-31
disconnect ssh Terminates an SSH connection PE 3-31
show ssh Displays the status of current SSH sessions PE 3-32










