Dell Force10 S4810P Configuration Manual page 902

High-density, 1ru 48-port 10gbe switch
Hide thumbs Also See for Force10 S4810P:
Table of Contents

Advertisement

Step
Task
2
Create shosts by copying the public
RSA key to the to the file shosts in the
diretory .ssh, and write the IP address
of the host to the file.
Figure 43-10. Creating shosts
admin@Unix_client# cd /etc/ssh
admin@Unix_client# ls
moduli
ssh_host_rsa_key.pub
ssh_host_rsa_key
admin@Unix_client# cat ssh_host_rsa_key.pub
ssh-rsa
AyWhVgJDQh39k8v3e8eQvLnHBIsqIL8jVy1QHhUeb7GaDlJVEDAMz30myqQbJgXBBRTWgBpLWwL/
doyUXFufjiL9YmoVTkbKcFmxJEMkE3JyHanEi7hg34LChjk9hL1by8cYZP2kYS2lnSyQWk=
admin@Unix_client# ls
id_rsa
admin@Unix_client# cat shosts
10.16.127.201, ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEA8K7jLZRVfjgHJzUOmXxuIbZx/AyW
hVgJDQh39k8v3e8eQvLnHBIsqIL8jVy1QHhUeb7GaDlJVEDAMz30myqQbJgXBBRTWgBpLWwL/
doyUXFufjiL9YmoVTkbKcFmxJEMkE3JyHanEi7hg34LChjk9hL1by8cYZP2kYS2lnSyQWk=
3
Create a list of IP addresses and usernames that are permitted to SSH in a file called rhosts, as shown in
Figure
43-11.
Figure 43-11. Creating rhosts
admin@Unix_client# ls
id_rsa
admin@Unix_client# cat rhosts
10.16.127.201 admin
4
Copy the file shosts and rhosts to the Dell Force10 system.
5
Disable password authentication and
RSA authentication, if configured
6
Enable host-based authentication.
7
Bind shosts and rhosts to host-based
authentication.
Client-based SSH Authentication
SSH from the chassis to the SSH client using using the command
version 1 or version 2. If the SSH port is a non-default value, use the command
change the default port number. You may only change the port number when SSH is disabled. When must
then still use the
902
|
Security
sshd_config
ssh_host_dsa_key.pub
ssh_config
AAAAB3NzaC1yc2EAAAABIwAAAIEA8K7jLZRVfjgHJzUOmXxuIbZx/
id_rsa.pub
shosts
id_rsa.pub
rhosts
shosts
option with the command
-p
Command Syntax
cp /etc/ssh/ssh_host_rsa_key.pub /.ssh/shosts
ssh_host_key.pub
ssh_host_dsa_key
ssh_host_key
no ip ssh password-authentication
no ip ssh rsa-authentication
ip ssh hostbased-authentication enable
ip ssh pub-key-file flash://filename
ip ssh rhostsfile flash://filename
.
ssh
Command Mode
CONFIGURATION
EXEC Privilege
CONFIGURATION
CONFIGURATION
ip_address. This method uses SSH
ssh
ip ssh server port
number, to

Advertisement

Table of Contents
loading

Table of Contents