Technical data

BLADE OS Command Reference
14
The Command Line Interface BMD00127, September 2009
Connecting to the Switch
You can access the command line interface in any one of the following ways:
Using a Telnet connection over the network
Using a SSH connection to securely log into another computer over a network
Using a serial connection using the serial port on the G8000
Connecting to the Switch via Telnet
Once you have configured the G8000 with an IP address and gateway, you can access the
switch from any workstation connected to the management network.
To establish a Telnet connection with the switch, run the Telnet program on your workstation
and issue the Telnet command, followed by the switch IP address:
Establishing an SSH Connection
Although a remote network administrator can manage the configuration of the G8000 via Tel-
net, this method does not provide a secure connection. The SSH (Secure Shell) protocol
enables you to securely log into another computer over a network to execute commands
remotely. As a secure alternative to using Telnet to manage switch configuration, SSH ensures
that all data sent over the network is encrypted and secure.
The switch can handle only one session of key/cipher generation at a time. Thus, an SSH/SCP
client will not be able to login if the switch is doing key generation at that time or if another
client has just logged in before this client. Similarly, the system will fail to do the key genera-
tion if a SSH/SCP client is logging in at that time.
The supported SSH encryption and authentication methods are listed below.
Server Host Authentication: Client RSA-authenticates the switch in the beginning of
every connection.
Key Exchange: RSA
Encryption: 3DES-CBC, DES
User Authentication: Local password authentication, Radius
telnet <switch IP address>