Troubleshooting Ssh; Telnet; Vty Line And Access-Class Configuration - Dell S6100 Configuration Manual

Hide thumbs Also See for S6100:
Table of Contents

Advertisement

Using Client-Based SSH Authentication
To SSH from the chassis to the SSH client, use the following command.
This method uses SSH version 1 or version 2. If the SSH port is a non-default value, use the ip ssh server port number command
to change the default port number. You may only change the port number when SSH is disabled. Then use the -p option with the ssh
command.
SSH from the chassis to the SSH client.
ssh ip_address
Example of Client-Based SSH Authentication
Dell#ssh 10.16.127.201 ?
-c
-l
-m
-p
-v

Troubleshooting SSH

To troubleshoot SSH, use the following information.
You may not bind id_rsa.pub to RSA authentication while logged in via the console. In this case, this message displays:%Error: No
username set for this term.
Enable host-based authentication on the server (Dell Networking system) and the client (Unix machine). The following message appears if
you attempt to log in via SSH and host-based is disabled on the client. In this case, verify that host-based authentication is set to "Yes" in
the file ssh_config (root permission is required to edit this file): permission denied (host based).
If the IP address in the RSA key does not match the IP address from which you attempt to log in, the following message appears. In this
case, verify that the name and IP address of the client is contained in the file /etc/hosts: RSA Authentication Error.

Telnet

To use Telnet with SSH, first enable SSH, as previously described.
By default, the Telnet daemon is enabled. If you want to disable the Telnet daemon, use the following command, or disable Telnet in the
startup config. To enable or disable the Telnet daemon, use the [no] ip telnet server enable command.
Example of Using Telnet for Remote Login
Dell(conf)#ip telnet server enable
Dell(conf)#no ip telnet server enable

VTY Line and Access-Class Configuration

Various methods are available to restrict VTY access in Dell Networking OS. These depend on which authentication scheme you use —
line, local, or remote.
Table 80. VTY Access
Authentication Method
Line
Local
Encryption cipher to use (for v2 clients only)
User name option
HMAC algorithm to use (for v2 clients only)
SSH server port option (default 22)
SSH protocol version
VTY access-class support?
YES
NO
Username access-class
support?
NO
YES
Remote authorization support?
NO
NO
Security
779

Advertisement

Table of Contents
loading

Table of Contents