EasyManua.ls Logo

Zte ZXR10 ZSR V2 - Configuring SSH Connection; Figure 1-3 Telnet Connection Configuration Example

Zte ZXR10 ZSR V2
192 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
ZXR10ZSRV2CongurationGuide(SystemManagement)
lCongurationDescription
ItisrequiredtoconnectaPCtoR1throughTelnet,seeFigure1-3.
Figure1-3TelnetConnectionCongurationExample
lCongurationFlow
1.ConnectaPCtoR1.
2.CongureT elnetonR1.
3.CongureanACLonR1tolterTCPconnections.
lCongurationCommands
RunthefollowingcommandsonR1:
R1(config)#linetelnetidle-timeout120
R1(config)#linetelnetabsolute-timeout1440
R1(config)#linetelnetaccess-classipv4wd
R1(config)#ipv4-access-listwd
R1(config-ipv4-acl)#rulepermittcp169.1.108.820.0.0.0any
R1(config-ipv4-acl)#exit
lCongurationVerication
IfnoACLiscongured,aPCwhoseIPaddressisinanynetworksegmentcanbe
connectedtoR1.
IfanACLiscongured,onlyPCswhoseIPaddressesareinthePermitcolumnof
theACLcanbeconnectedtoR1.
1.4ConguringSSHConnection
ThisproceduredescribeshowtoconnecttotheZXR10ZSRV2throughSSH.
Prerequisite
Thelocalterminalcanaccesstheremoterouternetwork.
Context
SecureShell(SSH)isdenedbytheIETFNetworkWorkingGroup.Itisasecurityprotocol
establishedonthebasisoftheapplicationlayerandtransportlayer.
TraditionalnetworkserviceprogramssuchasFTP,POP,andT elnetusecleartextto
transferdata.Therefore,usernamesandpasswordsarevulnerabletoman-in-the-middle
attacks.Comparedwithtraditionalnetworkserviceprograms,SSHismorereliable.It
providessecurityforremoteloginsessionsandothernetworkservices,andhasthe
followingadvantages:
1-6
SJ-20140504150128-007|2014-05-10(R1.0)ZTEProprietaryandCondential

Table of Contents

Other manuals for Zte ZXR10 ZSR V2

Related product manuals