User's Manual

Table Of Contents
97
Users Manual of CS-6306R
4.3.4 Introduction
4.3.4.1 SSH server
A scure and encrypted communication connection can be created between SSH client and the device through
SSH server. The connection has telnet-like functions. SSH server supports the encryption algorithms
including des, 3des and blowfish.
4.3.4.2 SSH client
SSH client is an application running under the ssh protocol. SSH client can provide authentication and
encryption, so SSH client gurantees secure communication between communication devices or devices
supporting SSH server even if these devices run in unsafe network conditions. SSH client supports the
encryption algorithms including des, 3des and blowfish.
4.3.4.3 Function
SSH server and SSH client supports version 1.5. Both of them only support the shell application.
4.3.5 Configuration Tasks
4.3.5.1 Configuring the authentication method list
SSH server adopts the login authentication mode. SSH server uses the default authentication method list by
default.
Run the following command in global configuration command mode to configure the authentication method
list:
Command Purpose
Ip sshd auth_method STRING Configures the authentication method list.
4.3.5.2 Configuring the access control list
To control the access to the device’s SSH server, you need to configure the access control list for SSH server.
Run the following command in global configuration mode to configure the access control list:
Command Purpose
Ip sshd access-class STRING Configures the access control list.
4.3.5.3 Configuring the authentication timeout value
After a connection is established between client and server, server cuts off the connection if authentication
cannot be approved within the set time.
Run the following command in global configuration mode to configure the configuration timeout value:
Command Purpose
Ip sshd timeout <60-65535> Configures the authentication timeout value.