11.2.1 List of configuration commands
The following tables list the commands used to configure SSH servers.
Command name |
Description |
---|---|
ip ssh |
Activate SSH servers. |
ip ssh authentication |
Restricts the user authentication method of SSH servers. |
ip ssh authkey |
Register the user public key used for public key authentication on SSH server. |
ip ssh ciphers |
Limits the encryption method used by SSHv2 servers. |
ip ssh key-exchange |
Limits the key exchange method used by SSHv2 servers. |
ip ssh macs |
Limits the message-authentication-code method used by SSHv2 servers. |
ip ssh version |
Limits SSH protocol version of SSH servers. |
transport input #1 |
Used to restrict the protocols that can be used to access the Switch from a remote operation terminal. |
ip access-group #2 |
This function is used to restrict access to the Switch from a remote operation terminal by IPv4 addressof the terminal. |
ipv6 access-class #2 |
This function is used to restrict access to the Switch from a remote operation terminal by IPv6 addressof the terminal. |
- Note #1
-
See "Configuration Command Reference Vol.1" "2. Operational terminal connection" .
- Note #2
-
See "Configuration Command Reference Vol.1" "6 Login Security and RADIUS/TACACS+" .