Secure Shell Authentication - Dell Force10 S4810P Configuration Manual

High-density, 1ru 48-port 10gbe switch
Hide thumbs Also See for Force10 S4810P:
Table of Contents

Advertisement

ip ssh hostbased-authentication enable:
ip ssh key-size:
ip ssh password-authentication enable:
ip ssh pub-key-file:
ip ssh rhostsfile:
ip ssh rsa-authentication enable:
ip ssh rsa-authentication:
show crypto:
show ip ssh client-pub-keys:
show ip ssh rsa-authentication:
ssh-peer-rpm

Secure Shell Authentication

Secure Shell (SSH) is disabled by default. Enable it using the command
SSH supports three methods of authentication:
SSH Authentication by Password on page 900
RSA Authentication of SSH on page 901
Host-based SSH Authentication on page 901
Important Points to Remember for SSH Authentication
If more than one method is enabled, the order in which the methods are preferred is based on the
ssh_config file on the Unix machine.
When all the three authentication methods are enabled, password authentication is the backup method
when the RSA method fails.
The files known_hosts and known_hosts2 are generated when a user tries to SSH using version 1 or
version 2, respectively.
SSH Authentication by Password
Authenticate an SSH client by prompting for a password when attempting to connect to the Dell Force10
system. This is the simplest methods of authentication and uses SSH version 1.
Enable SSH password authentication using the command
CONFIGURATION mode. View your SSH configuration using the command
Privilege mode.
900
|
Security
Enable hostbased-authentication for the SSHv2 server.
Configure the size of the server-generated RSA SSHv1 key.
Enable password authentication for the SSH server.
Specify the file to be used for host-based authentication.
Specify the rhost file to be used for host-based authorization.
Enable RSA authentication for the SSHv2 server.
Add keys for the RSA authentication.
Display the public part of the SSH host-keys.
Display the client public keys used in host-based authentication.
Display the authorized-keys for the RSA authentication.
: Open an SSH connection to the peer RPM.
ip ssh server enable
ip ssh password-authentication enable
show ip ssh
.
from
from EXEC

Advertisement

Table of Contents
loading

Table of Contents