D-Link DES-3828 Product Manual - Page 246

SSH Commands, Purpose, Syntax, enable ssh, Description, Parameters, Restrictions

Page 246 highlights

xStack DES-3800 Series Layer 3 Stackable Fast Ethernet Managed Switch CLI Manual 37 SSH COMMANDS The steps required to use the Secure Shell (SSH) protocol for secure communication between a remote PC (the SSH Client) and the Switch (the SSH Server), are as follows: 1. Create a user account with admin-level access using the create account admin command. This is identical to creating any other admin-lever user account on the Switch, including specifying a password. This password is used to login to the Switch, once secure communication has been established using the SSH protocol. 2. Configure the user account to use a specified authorization method to identify users that are allowed to establish SSH connections with the Switch using the config ssh user authmode command. There are three choices as to the method SSH will use to authorize the user, and they are password, publickey and hostbased. 3. Configure the encryption algorithm that SSH will use to encrypt and decrypt messages sent between the SSH Client and the SSH Server. 4. Finally, enable SSH on the Switch using the enable ssh command. After following the above steps, you can configure an SSH Client on the remote PC and manage the Switch using secure, in-band communication. The Secure Shell (SSH) commands in the Command Line Interface (CLI) are listed (along with the appropriate parameters) in the following table. Command Parameters enable ssh disable ssh config ssh authmode [password | publickey | hostbased] [enable | disable] show ssh authmode config ssh server {maxsession | contimeout | authfail | rekey [10min | 30min | 60min | never] show ssh server config ssh user authmode [hostbased [hostname | hostname_IP ] | password | publickey] show ssh user authmode config ssh algorithm [3DES | AES128 | AES192 | AES256 | arcfour | blowfish | cast128 | twofish128 | twofish192 | twofish256 | MD5 | SHA1 | RSA | DSA] [enable | disable] show ssh algorithm config ssh regenerate hostkey Each command is listed, in detail, in the following sections. enable ssh Purpose Syntax Description Parameters Restrictions Used to enable SSH. enable ssh This command allows you to enable SSH on the Switch. None. Only Administrator or Operator-level users can issue this command. Usage example: To enable SSH: 242

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452

xStack DES-3800 Series Layer 3 Stackable Fast Ethernet Managed Switch CLI Manual
242
37
SSH
C
OMMANDS
The steps required to use the Secure Shell (SSH) protocol for secure communication between a remote PC (the SSH Client) and the
Switch (the SSH Server), are as follows:
1.
Create a user account with admin-level access using the
create account admin <username> <password>
command.
This is identical to creating any other admin-lever user account on the Switch, including specifying a password. This
password is used to login to the Switch, once secure communication has been established using the SSH protocol.
2.
Configure the user account to use a specified authorization method to identify users that are allowed to establish SSH
connections with the Switch using the config ssh user authmode command. There are three choices as to the method SSH
will use to authorize the user, and they are password, publickey and hostbased.
3.
Configure the encryption algorithm that SSH will use to encrypt and decrypt messages sent between the SSH Client and
the SSH Server.
4.
Finally, enable SSH on the Switch using the
enable ssh
command.
After following the above steps, you can configure an SSH Client on the remote PC and manage the Switch using secure, in-band
communication.
The Secure Shell (SSH) commands in the Command Line Interface (CLI) are listed (along with the appropriate parameters) in the
following table.
Command
Parameters
enable ssh
disable ssh
config ssh authmode
[password | publickey | hostbased] [enable | disable]
show ssh authmode
config ssh server
{maxsession <int 1-8> | contimeout <sec 120-600> | authfail <int 2-20> |
rekey [10min | 30min | 60min | never]
show ssh server
config ssh user
<username> authmode [hostbased [hostname <domain_name> |
hostname_IP <domain_name> <ipaddr>] | password | publickey]
show ssh user authmode
config ssh algorithm
[3DES | AES128 | AES192 | AES256 | arcfour | blowfish | cast128 |
twofish128 | twofish192 | twofish256 | MD5 | SHA1 | RSA | DSA] [enable |
disable]
show ssh algorithm
config ssh regenerate hostkey
Each command is listed, in detail, in the following sections.
enable ssh
Purpose
Used to enable SSH.
Syntax
enable ssh
Description
This command allows you to enable SSH on the Switch.
Parameters
None.
Restrictions
Only Administrator or Operator-level users can issue this command.
Usage example:
To enable SSH: