SSH

Secure Shell (SSH) allows secure access to management functions on a remote networking device. Unlike Telnet, which offers no security, SSH provides a secure, encrypted connection to the device.

SSH support is available in privileged EXEC mode on all Extreme platforms. The device supports a combined maximum (SSH, Telnet, and serial) of 32 non-root CLI sessions. Both IPv4 and IPv6 addresses are supported. Root users have another five dedicated sessions.

The SSH service is enabled by default on the device. When the SSH server is disabled, existing inbound SSH connections are terminated and access to the device by additional inbound connections are not allowed until the SSH server is re-enabled. If you have admin privileges, you can disable and re-enable inbound SSH connections from global configuration mode.

Note

Note

Outgoing SSH connections from the device to any remote device are not affected by disabling or enabling the SSH server in the device.
Note

Note

When using SSH, the root ID is blocked and you cannot login as root. Use root enable command to enable the root ID.