SGS-6341-Series User Manual

Table Of Contents
4-4
<1-15> {start-stop | stop-only | none}
method1 [method2…]
no accounting line {console | vty}
command <1-15>
Admin Mode
terminal monitor
terminal no monitor
Display debug information for Telnet
client login to the switch; the no
command disables the debug
information.
show users
Show the user information who logs in
through Telnet or SSH. It includes line
number, user name and user IP.
clear line vty <0-31>
Delete the logged user information on the
appointed line; force user to get down the
line who logs in through Telnet or SSH.
2. Telnet to a remote host from the switch
Command Explanation
Admin Mode
telnet [vrf <vrf-name>] {<ip-addr> |
<ipv6-addr> | host <hostname>} [<port>]
Login to a remote host with the Telnet
client included in the switch.
4.2.2 SSH
4.2.2.1 Introduction to SSH
SSH (Secure Shell) is a protocol which ensures a secure remote access connection to network
devices. It is based on the reliable TCP/IP protocol. By conducting the mechanism such as key
distribution, authentication and encryption between SSH server and SSH client, a secure
connection is established. The information transferred on this connection is protected from
being intercepted and decrypted. The switch meets the requirements of SSH2.0. It supports
SSH2.0 client software such as SSH Secure Client and putty. Users can run the above
software to manage the switch remotely.
The switch presently supports RSA authentication, 3DES Cryptography Protocol, SSH user
password authentication, etc.