You can issue RSH requests to the cluster to perform administrative tasks. RSH is not a secure protocol and is disabled by default.
The -application parameter of the security login commands specifies the access method for a user account. For more information, see the security login man pages.
By default, RSH is disabled. The system services firewall policy show command with the -service rsh parameter displays whether RSH has been enabled in a firewall policy. For more information, see the system services firewall policy man pages.
The network options ipv6 show command displays whether IPv6 is enabled. The system services firewall policy show command displays firewall policies.
You should consider using SSH to access the cluster. SSH provides a secure remote shell and interactive network session.
If the cluster management LIF resides on the node, it shares this limit with the node management LIF.
If the rate of in-coming connections is higher than 10 per second, the service is temporarily disabled for 60 seconds.
hostname_or_IP is the host name or the IP address of the cluster management LIF or a node management LIF. Using the cluster management LIF is recommended. You can use an IPv4 or IPv6 address.
command is the command you want to execute over RSH.
admin_host$ rsh 10.72.137.28 -l joe:password system services web show External Web Services: true Status: online HTTP Protocol Port: 80 HTTPs Protocol Port: 443 TLSv1 Enabled: true SSLv3 Enabled: true SSLv2 Enabled: false admin_host$