938
|
Security
www.dell.com | support.dell.com
•
ip ssh connection-rate-limit:
Configure the maximum number of incoming SSH connections per
minute.
•
ip ssh hostbased-authentication enable:
Enable hostbased-authentication for the SSHv2 server.
•
ip ssh key-size:
Configure the size of the server-generated RSA SSHv1 key.
•
ip ssh password-authentication enable:
Enable password authentication for the SSH server.
•
ip ssh pub-key-file:
Specify the file to be used for host-based authentication.
•
ip ssh rhostsfile:
Specify the rhost file to be used for host-based authorization.
•
ip ssh rsa-authentication enable:
Enable RSA authentication for the SSHv2 server.
•
ip ssh rsa-authentication:
Add keys for the RSA authentication.
•
show crypto:
Display the public part of the SSH host-keys.
•
show ip ssh client-pub-keys:
Display the client public keys used in host-based authentication.
•
show ip ssh rsa-authentication:
Display the authorized-keys for the RSA authentication.
•
ssh-peer-rpm
: Open an SSH connection to the peer RPM.
Secure Shell Authentication
Secure Shell (SSH) is disabled by default. Enable it using the command
ip ssh server enable
.
SSH supports three methods of authentication:
•
SSH Authentication by Password on page 938
•
RSA Authentication of SSH on page 939
•
Host-based SSH Authentication on page 939
Important Points to Remember for SSH Authentication
•
If more than one method is enabled, the order in which the methods are preferred is based on the
ssh_config
file on the Unix machine.
•
When all the three authentication methods are enabled, password authentication is the backup method
when the RSA method fails.
•
The files
known_hosts
and
known_hosts2
are generated when a user tries to SSH using version 1 or
version 2, respectively.
SSH Authentication by Password
Authenticate an SSH client by prompting for a password when attempting to connect to the Dell Force10
system. This is the simplest methods of authentication and uses SSH version 1.
Enable SSH password authentication using the command
ip ssh password-authentication
enable
from
CONFIGURATION mode. View your SSH configuration using the command
show ip ssh
from EXEC
Privilege mode.
Summary of Contents for Force10 E300
Page 1: ...FTOS Configuration Guide FTOS 8 4 2 7 E Series TeraScale C Series S Series S50 S25 ...
Page 32: ...32 w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 132: ...132 802 1X w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 310: ...310 Configuration Replace and Rollback w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 330: ...330 Dynamic Host Configuration Protocol w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 402: ...402 High Availability w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 462: ...462 Interfaces w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 482: ...482 IPv4 Addressing w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 506: ...506 IPv6 Addressing w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 582: ...582 Layer 2 w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 642: ...642 Multicast Source Discovery Protocol w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 662: ...662 Multiple Spanning Tree Protocol w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 690: ...690 Object Tracking w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 754: ...754 PIM Dense Mode w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 784: ...784 PIM Source Specific Mode w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 800: ...800 Power over Ethernet w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 876: ...876 Quality of Service w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 892: ...892 Routing Information Protocol w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1006: ...1006 Simple Network Management Protocol w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1018: ...1018 SONET SDH w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1048: ...1048 Broadcast Storm Control w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1096: ...1096 Uplink Failure Detection UFD w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1098: ...1098 Upgrade Procedures w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1196: ...1196 C Series Debugging and Diagnostics w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1252: ...1252 Standards Compliance w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1262: ...1262 Index w w w d e l l c o m s u p p o r t d e l l c o m ...