АМАТЕК AN-SGM28P24-400 [36/322] Ssh service control

АМАТЕК AN-SGM28P24-400 [36/322] Ssh service control
35 / 322
source IP address is not
controlled
no security-manage http
access-group
Close source IP address
control
Global
configuration mode
show security-manage
You can see the configuration
of the service control
Privileged mode
2.1.8 SSH service control
The traditional network service program, such as: FTP, pop and telnet are not safe in nature,
because they use plaintext passwords and data transfer on the network, people have an ulterior
motive is very easy to intercept these passwords and dataMoreover, the security verification of
these service programs is also vulnerable, that is very easy to "man" (man-in-the-middle) in this
way the attackThe so-called "middleman" attack, is the "middleman" to impersonate the real
server to receive the data you send to the server, and then pretend to be you pass the data to the
real serverWhen the data transfer between the server and you is done by the middleman, there
will be a serious problemBy using SSH, you can encrypt all the data transmitted, so that
"middleman" this attack can not be achieved, but also to prevent DNS spoofing and IP spoofing
The use of SSH, there is an additional benefit is that the transmission of data is compressed, so
you can speed up the transmission speed. SSH has a lot of features, it can replace Telnet, but also
for FTP, PoP, and even for PPP to provide a secure "channel"
2.2 System maintenance and debugging
The basic functions of system maintenance and debugging include the following contents
Configure the host name of the system
Configuring the system clock
Configure terminal timeout attributes
System reset
View system information
Network connectivity debugging
Detecting line distance
Traceroute debugging

Содержание

Похожие устройства

Скачать
Случайные обсуждения