Specifications
Security Configuration Command Set
Configuring Secure Shell (SSH)
Matrix E1 Series (1G58x-09 and 1H582-xx) Configuration Guide 14-85
14.3.6 Configuring Secure Shell (SSH)
Purpose
To review, enable, disable, and configure the Secure Shell (SSH) protocol. SSH provides a secure,
remote connection to the device by permitting or denying access based on IP address, ciphers and
MAC algorithms.
Commands
The commands needed to review and configure SSH are listed below and described in the associated
section as shown:
• show ssh (Section 14.3.6.1)
• ssh (server) (Section 14.3.6.2)
• set ssh (Section 14.3.6.3)
• set ssh ciphers (Section 14.3.6.4)
• clear ssh ciphers (Section 14.3.6.5)
• set ssh port (Section 14.3.6.6)
• set ssh mac (Section 14.3.6.7)
• clear ssh mac (Section 14.3.6.8)
• set ssh rekeyintervalseconds (Section 14.3.6.9)
• set ssh passwordguesses (Section 14.3.6.10)
• set ssh logingracetime (Section 14.3.6.11)
• clear ssh keys (Section 14.3.6.12)
• clear ssh config (Section 14.3.6.13)