255. 255. 255. 0
zte(cfg)#show remote-access
Whether check remote manage address: YES
Allowable remote manage address list:
10. 40. 92. 0/255. 255. 255. 0
zte(cfg)#
Only allows network management user to access the switch from
10. 40. 92. 212 through Telnet.
zte(cfg)#set remote-access specific
zte(cfg)#set remote-access ipaddress 10. 40. 92. 212
zte(cfg)#show remote-access
Whether check remote manage address: YES
Allowable remote manage address list:
10. 40. 92. 212/255. 255. 255. 255
zte(cfg)#
Allow network management user to access switch from any IP
address through Telnet.
zte(cfg)#set remote-access any
zte(cfg)#show remote-access
Whether check remote manage address: NO
Allowable remote manage address list:
none
zte(cfg)#
SSH Overview
Secure shell (SSH) is a protocol created by Network Working
Group of the IETF, offers secure remote access and other
secure network services over an insecure network.
Purpose of the SSH protocol is to solve the security problems in
interconnected networks, and to offer a securer substitute for
Telnet and Rlogin (Although the present development of the SSH
protocol has far exceeded the remote access function scope),
therefore, the SSH connection protocol shall support interactive
session.
SSH is to encrypt all transmitted data, even if these data is
intercepted, no useful information can be obtained.
Example 2
Example 3
SSH Purpose