Configuration Guide Vol. 1


11.2.1 List of configuration commands

The following tables list the commands used to configure SSH servers.

Table 11-11: List of configuration commands

Command name

Description

ip ssh

Activate SSH servers.

ip ssh authentication

Restricts the user authentication method of SSH servers.

ip ssh authkey

Register the user public key used for public key authentication on SSH server.

ip ssh ciphers

Limits the encryption method used by SSHv2 servers.

ip ssh key-exchange

Limits the key exchange method used by SSHv2 servers.

ip ssh macs

Limits the message-authentication-code method used by SSHv2 servers.

ip ssh version

Limits SSH protocol version of SSH servers.

transport input #1

Used to restrict the protocols that can be used to access the Switch from a remote operation terminal.

ip access-group #2

This function is used to restrict access to the Switch from a remote operation terminal by IPv4 addressof the terminal.

ipv6 access-class #2

This function is used to restrict access to the Switch from a remote operation terminal by IPv6 addressof the terminal.

Note #1

See "Configuration Command Reference Vol.1" "2. Operational terminal connection" .

Note #2

See "Configuration Command Reference Vol.1" "6 Login Security and RADIUS/TACACS+" .