User's Manual

Table Of Contents
67
Users Manual of GPL-8000
SSH Configuration commands
4.4.1. Introduction
4.4.1.1. SSH server
A scure and encrypted communication connection can be created between SSH client and the device through
SSH server. The connection has telnet-like functions. SSH server supports the encryption algorithms
including des, 3des and blowfish.
4.4.1.2. SSH client
SSH client is an application running under the ssh protocol. SSH client can provide authentication and
encryption, so SSH client gurantees secure communication between communication devices or devices
supporting SSH server even if these devices run in unsafe network conditions. SSH client supports the
encryption algorithms including des, 3des and blowfish.
4.4.1.3. Function
SSH server and SSH client supports version 1.5. Both of them only support the shell application.
4.4.2. Configuration Tasks
4.4.2.1. Configuring the authentication method list
SSH server adopts the login authentication mode. SSH server uses the default authentication method list by
default.
Run the following command in global configuration command mode to configure the authentication method
list:
Command Purpose
Ip sshd auth_method STRING Configures the authentication method list.
4.4.2.2. Configuring the access control list
To control the access to the device’s SSH server, you need to configure the access control list for SSH server.
Run the following command in global configuration mode to configure the access control list:
Command Purpose
Ip sshd access-class STRING Configures the access control list.