EasyManua.ls Logo

Cisco CRS User Manual

Cisco CRS
304 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #293 background imageLoading...
Page #293 background image
ssh server session-limit
To configure the number of allowable concurrent incoming Secure Shell (SSH) sessions, use the ssh server
session-limit command. To return to the default value, use the no form of this command.
ssh server session-limit sessions
no ssh server session-limit
Syntax Description
Number of incoming SSH sessions allowed across the router. The range is from
1 to 1024.
sessions
Command Default
sessions: 64 per router
Command Modes
Global configuration
Command History
ModificationRelease
This command was introduced.Release 2.0
Usage Guidelines
Use the ssh server session-limit command to configure the limit of allowable concurrent incoming SSH
connections. Outgoing connections are not part of the limit.
Task ID
OperationsTask ID
read, writecrypto
Examples
The following example shows how to set the limit of incoming SSH connections to 50:
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# ssh server session-limit 50
Cisco IOS XR System Security Command Reference for the Cisco CRS Router, Release 4.1
OL-24740-01 283
Secure Shell Commands
ssh server session-limit

Table of Contents

Other manuals for Cisco CRS

Question and Answer IconNeed help?

Do you have a question about the Cisco CRS and is the answer not in the manual?

Cisco CRS Specifications

General IconGeneral
Operating SystemCisco IOS XR
Product TypeCore Router
Form FactorModular Chassis
DimensionsVaries by chassis type
WeightVaries by chassis type
ArchitectureDistributed
Switch FabricMulti-stage
Interface SupportEthernet, SONET/SDH, OTN
Interfaces/PortsVaries by line card
Port DensityVaries by line card
Routing ProtocolBGP, IS-IS, OSPF, MPLS
ManagementCLI, SNMP
Power SupplyRedundant, hot-swappable
CoolingRedundant, Hot-swappable Fan Trays
Supported ProtocolsIPv4, IPv6, MPLS
Management InterfacesEthernet, console
Security FeaturesACLs

Summary

Preface

Document Change History

Lists technical changes made to the document since its initial release.

Documentation and Service Request Procedures

Provides information on obtaining documentation and submitting service requests.

Authentication, Authorization, and Accounting Commands

AAA Accounting Configuration

Configures AAA accounting methods for commands, EXEC sessions, network services, or system events.

AAA Authentication Configuration

Configures AAA authentication method lists for login, PPP, or subscriber authentication.

AAA Authorization Configuration

Configures AAA authorization method lists for commands, EXEC sessions, network services, or subscribers.

RADIUS Server Key Configuration

Specifies the authentication and encryption key for RADIUS communications between router and daemon.

TACACS+ Server Host Configuration

Specifies a TACACS+ host server, including its name or IP address and port.

IPSec Commands

Clear IPSec Security Associations

Deletes specific or all IPSec security associations (SAs) from the SADB or clears counters/interfaces.

Show IPSec SA Information

Displays security association (SA) information based on rack/slot/module location, peer, profile, or count.

Configure IPSec Tunnel Encapsulation

Sets the encapsulation mode for a tunnel interface, specifying GRE or IPv4.

Keychain Management Commands

Keychain Key Configuration

Creates or modifies a keychain key, specifying a 48-bit integer key identifier.

Keychain Management

Creates or modifies a keychain, specifying its name and maximum character limit.

Show Keychain Status

Displays the keychain status, including keys, tolerance, lifetimes, and cryptographic algorithm.

Lawful Intercept Commands

Disable Lawful Intercept Feature

Disables the Lawful Intercept (LI) feature, which also deletes associated Mediation Devices and TAPs.

Management Plane Protection Commands

Configure Management Traffic IP Address

Configures peer IPv4 or IPv6 addresses for management traffic allowed on an interface.

Allow Management Traffic Protocols

Configures an interface to allow peer-filtering for specified management protocols or all protocols.

Configure Management Plane Protection

Configures management plane protection to allow and disallow protocols.

Configure Out-of-Band Management

Configures out-of-band interfaces or protocols and enters management plane protection out-of-band configuration mode.

Public Key Infrastructure Commands

Authenticate Certificate Authority

Authenticates the CA to the router by obtaining the CA's certificate and verifying its fingerprint.

Configure Trusted Certificate Authority

Declares a CA and configures a trusted point for verifying peer certificates.

Generate RSA Key Pair

Generates Rivest, Shamir, and Adelman (RSA) key pairs for signing and encryption.

Software Authentication Manager Commands

Add Certificate to SAM Table

Adds a new certificate to the SAM certificate table, with or without validation.

Show SAM Certificate Information

Displays records in the SAM certificate table, including location, index, and flag.

Show SAM System Information

Displays current configuration settings, status, prompt interval, and default response for SAM.

Secure Shell Commands

Start SSH Client Connection

Starts an SSH client connection and enables an outbound connection to an SSH server.

Configure SSH Server

Enables the SSH server, configures VRFs for its use, and sets the server version to SSHv2.

Authenticate SSH Server Public Key

Authenticates a server public key (pubkey) by storing it in the client's local database.

Secure Socket Layer Protocol Commands

Show Active SSL Sessions

Displays active Secure Socket Layer (SSL) sessions, showing PID, Method, Type, Peer, Port, and Cipher-Suite.

Related product manuals