Ssh Protocol Support - Avaya G430 Manual

Administering branch gateway
Hide thumbs Also See for G430:
Table of Contents

Advertisement

show login
authentication
show upload auth-file
status

SSH protocol support

Secure Shell (SSH) protocol is a security protocol that enables you to establish a remote
session over a secured tunnel, also called a remote shell. SSH accomplishes this by creating
a transparent, encrypted channel between the local and remote devices. In addition to the
remote shell, SSH provides secure file transfer between the local and remote devices. SSH is
used for SCP file transfers. The Branch Gateway supports two concurrent SSH users.
Establishing an SSH session can be done by RSA authentication, or password authentication.
To determine which of these ways is used on your Branch Gateway, enter show ip ssh.
Note:
SSH supports IPv4 and IPv6.
Related topics:
RSA authentication process
Password authentication process
Enabling SSH on the Gateway
Disabling SSH on the Gateway
Summary of SSH configuration commands
RSA authentication process
1. The Branch Gateway generates a key of variable length (512-2048 bits) using the
2. The Branch Gateway calculates an MD5 hash of the private key, called the public
3. The Branch Gateway sends the public key to the client computer. This public key
4. Both sides negotiate and must agree on the same chipper type. The Branch
Administering Avaya G430 Branch Gateway
Command
on page 45
DSA encryption method. This is the private key.
key (also called a fingerprint). The public key is always 16 bytes long. This public
key is displayed.
is used by the client to encrypt the data it sends to the Branch Gateway. The Branch
Gateway decrypts the data using the private key.
Gateway only supports 3DES-CBC encryption. The user on the client side accepts
Description
Display login authentication settings and information
Display upload status of ASG authentication file, after
using
copy auth-file ftp|scp|tftp
upload an authentication file from the gateway
on page 46
on page 46
on page 46
on page 47
Security overview
to
October 2013
45

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents