User's Manual
70
Chapter 6 SSH Configuration Commands
6.1 Ssh Overview
6.1.1 SSH Server
SSH client can provide a secure and encrypted communication link through SSH server and other devices.
This connection has the same functions as those of Telnet. SSH server supports the following encryption
algorithms: des, 3des and blowfish.
6.1.2 SSH Client
SSH client runs on the basis of the SSH protocol, providing authentication and encryption. Due to the
application of authentication and encryption, SSH client ssh client allows to establish secure communication
in unsecure network environment between our’s communication devices or between other devices that support
ssh server. SSH client supports the following encryption algorithms: des, 3des and blowfish.
6.1.3 Attribute Realization
SSH server and SSH client support SSH 1.5. Both of them supports the shell application.
6.2 Configuration Tasks
6.2.1 Configuring the Authentication Method List
SSH server adopts the login authentication mode. SSH server uses the default authentication method list by
default.
In global configuration mode, the following command can be used to configure the authentication method list.
Command Purpose
ip sshd auth-method STRING Configure the authentication method list.
The length of the authentication method's
name is no more than 20 characters.
6.2.2 Configuring Access List
In order to control SSH server to access other devices, you can configure ACL for SSH server.
In global configuration mode, the following command can be used to configure the timeout time.
Command Purpose
ip sshd access-class STRING Configures ACL. The length of the access list's
name is no more than 19 characters.
6.2.3 Configuring the Authentication Timeout Time
After SSH client connects SSH server successfully, the SSH server will close the connection if the
authentication cannot be passed during the configured time.