Configuration Guide Vol. 1


11.1.2 Basic functions of SSH

<Structure of this section>

(1) Secure Remote Login

Uses the secure communication channel provided by SSH for remote login. Secure remote login allows you to securely log in to SSH server from the operation terminal, even over the Internet. In addition, since the contents of communications cannot be viewed by others, secure operation management can be realized.

By using secure remote login for the operation of the Switch, you can safely log in to the Switch from an operation terminal over the Internet.

(2) Secure command execution

This function executes commands on servers using the secure communication channel provided by SSH. If secure command execution is used in an environment where public key authentication is used for user authentication, the command can be safely executed without login or password entry from a remote operation terminal.

By using secure command execution for the operation of the Switch, you can easily use simple operation commands, such as checking ARP table and checking communication using ping.

When executing a command on the Switch using a secure command from a SSH client, there are two points to be noted as follows:

(3) Secure copy (SCP)

Uses the secure communication channel provided by SSH to specify the source file name and destination file name, and to transfer files between the client and server. When you specify a file on the server as the copy source, the file is copied from the server to the client. When you specify a file on the server as the copy destination, the file is copied from the client to the server.

By using a secure copy for the Switch operation, you can safely back up the configuration.

(4) Secure FTP(SFTP)

This function transfers files between the client and server using the secure communication channel provided by SSH and using the same interactive interface as FTP. In addition to file transfer, you can check the file name and delete the file.

By using a secure FTP for the operation of the Switch, you can obtain an update file safely when an update is performed.