EasyManua.ls Logo

Zte ZXR10 2920 - SSH Overview

Zte ZXR10 2920
341 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter 9 Network Management
Confidential and Proprietary Information of ZTE CORPORATION 221
zte(cfg)#set remote-access specific
zte(cfg)#set remote-access ipaddress 10. 40. 92.
0
255. 255. 255. 0
zte(cfg)#show remote-access
Whether check remote manage address: YES
Allowable remote manage address list:
10. 40. 92. 0/255. 255. 255. 0
zte(cfg)#
Only allows network management user to access the switch from
10. 40. 92. 212 through Telnet.
zte(cfg)#set remote-access specific
zte(cfg)#set remote-access ipaddress 10. 40. 92. 212
zte(cfg)#show remote-access
Whether check remote manage address: YES
Allowable remote manage address list:
10. 40. 92. 212/255. 255. 255. 255
zte(cfg)#
Allow network management user to access switch from any IP
address through Telnet.
zte(cfg)#set remote-access any
zte(cfg)#show remote-access
Whether check remote manage address: NO
Allowable remote manage address list:
none
zte(cfg)#
SSH Overview
Secure shell (SSH) is a protocol created by Network Working
Group of the IETF, offers secure remote access and other
secure network services over an insecure network.
Purpose of the SSH protocol is to solve the security problems in
interconnected networks, and to offer a securer substitute for
Telnet and Rlogin (Although the present development of the SSH
protocol has far exceeded the remote access function scope),
therefore, the SSH connection protocol shall support interactive
session.
SSH is to encrypt all transmitted data, even if these data is
intercepted, no useful information can be obtained.
Example 2
Example 3
SSH Purpose

Table of Contents

Related product manuals