Secure Shell Authentication; Important Points To Remember For Ssh Authentication; Ssh Authentication By Password - Dell Force10 MXL Blade Configuration Manual

Configuration guide for the mxl 10/40gbe switch io module
Hide thumbs Also See for Force10 MXL Blade:
Table of Contents

Advertisement

ip ssh authentication-retries:
authenticate a user.
ip ssh connection-rate-limit:
ip ssh hostbased-authentication enable:
ip ssh key-size:
ip ssh password-authentication enable:
ip ssh pub-key-file:
ip ssh rhostsfile:
ip ssh rsa-authentication enable:
ip ssh rsa-authentication:
show crypto:
show ip ssh client-pub-keys:
show ip ssh rsa-authentication:

Secure Shell Authentication

SSH is disabled by default. Enable it using the
SSH supports three methods of authentication:

SSH Authentication by Password

RSA Authentication of SSH
Host-Based SSH Authentication

Important Points to Remember for SSH Authentication

If you enable more than one method, the order in which the methods are preferred is based on the
ssh_config file on the Unix machine.
When you enable all the three authentication methods, password authentication is the backup method
when the RSA method fails.
The known_hosts and known_hosts2 files are generated when a user tries to SSH using version 1 or
version 2, respectively.
SSH Authentication by Password
Authenticate an SSH client by prompting for a password when attempting to connect to the Dell Force10
system. This is the simplest methods of authentication and uses SSH version 1.
To enable SSH password authentication, use the
CONFIGURATION mode. To view your SSH configuration, use the
Privilege mode
496
|
Security
Configure the maximum number of attempts that should be used to
Configure the maximum number of incoming SSH connections per minute.
Configure the size of the server-generated RSA SSHv1 key.
Enable password authentication for the SSH server.
Specify the file to be used for host-based authentication.
Specify the rhost file to be used for host-based authorization.
Enable RSA authentication for the SSHv2 server.
Add keys for the RSA authentication.
Display the public part of the SSH host-keys.
Display the client public keys used in host-based authentication.
Display the authorized-keys for the RSA authentication.
(Figure
28-10).
Enable hostbased-authentication for the SSHv2 server.
ip ssh server enable
ip ssh password-authentication enable
command.
command from
command from EXEC
show ip ssh

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents