The requested article is not available. Either it doesn't apply to this version of the product or the relevant information is organized differently in this version of the docs. You can search, browse, or go back to the other version.
A newer release of this product is available.
security protocol ssh modify
Contributors
-
PDF of this doc site

Collection of separate PDF docs
Creating your file...
This may take a few minutes. Thanks for your patience.
Your file is ready
Modify the SSH configuration
Availability: This command is available to cluster administrators at the advanced privilege level.
Description
The security protocol ssh modify
command modifies the existing cluster-wide configuration of SSH
Parameters
[-per-source-limit <integer>]
- Per-Source Limit (privilege: advanced)-
Modifies the maximum number of SSH instances per source IP address on a per-node basis.
[-max-instances <integer>]
- Maximum Number of Instances (privilege: advanced)-
Modifies the maximum number of SSH instances that can be handled on a per-node basis.
[-connections-per-second <integer>]
- Connections Per Second (privilege: advanced)-
Modifies the maximum number of SSH connections per second on a per-node basis.
Examples
The following example modifies cluster-wide SSH configuration:
cluster1::*> security protocol ssh modify -per-source-limit 30 -max-instances 60 -connections-per-second 5