ZXR10ZSRV2ConīægurationGuide(SystemManagement)
lConīægurationDescription
ItisrequiredtoconnectaPCtoR1throughTelnet,seeFigure1-3.
Figure1-3TelnetConnectionConīægurationExample
lConīægurationFlow
1.ConnectaPCtoR1.
2.ConīægureT elnetonR1.
3.ConīægureanACLonR1toīælterTCPconnections.
lConīægurationCommands
RunthefollowingcommandsonR1:
R1(config)#linetelnetidle-timeout120
R1(config)#linetelnetabsolute-timeout1440
R1(config)#linetelnetaccess-classipv4wd
R1(config)#ipv4-access-listwd
R1(config-ipv4-acl)#rulepermittcp169.1.108.820.0.0.0any
R1(config-ipv4-acl)#exit
lConīægurationVeriīæcation
IfnoACLisconīægured,aPCwhoseIPaddressisinanynetworksegmentcanbe
connectedtoR1.
IfanACLisconīægured,onlyPCswhoseIPaddressesareinthePermitcolumnof
theACLcanbeconnectedtoR1.
1.4ConīguringSSHConnection
ThisproceduredescribeshowtoconnecttotheZXR10ZSRV2throughSSH.
Prerequisite
Thelocalterminalcanaccesstheremoterouternetwork.
Context
SecureShell(SSH)isdeīænedbytheIETFNetworkWorkingGroup.Itisasecurityprotocol
establishedonthebasisoftheapplicationlayerandtransportlayer.
TraditionalnetworkserviceprogramssuchasFTP,POP,andT elnetusecleartextto
transferdata.Therefore,usernamesandpasswordsarevulnerabletoman-in-the-middle
attacks.Comparedwithtraditionalnetworkserviceprograms,SSHismorereliable.It
providessecurityforremoteloginsessionsandothernetworkservices,andhasthe
followingadvantages:
1-6
SJ-20140504150128-007|2014-05-10(R1.0)ZTEProprietaryandConīædential