Secure Shell Authentication - Dell Force10 Z9000 Configuration Manual

Ftos configuration guide for z9000 system
Hide thumbs Also See for Force10 Z9000:
Table of Contents

Advertisement

ip ssh connection-rate-limit:
minute.
ip ssh hostbased-authentication enable:
ip ssh key-size:
ip ssh password-authentication enable:
ip ssh pub-key-file:
ip ssh rhostsfile:
ip ssh rsa-authentication enable:
ip ssh rsa-authentication:
show crypto:
show ip ssh client-pub-keys:
show ip ssh rsa-authentication:
ssh-peer-rpm

Secure Shell Authentication

Secure Shell (SSH) is disabled by default. Enable it using the command
SSH supports three methods of authentication:
SSH Authentication by Password on page 806
RSA Authentication of SSH on page 807
Host-based SSH Authentication on page 807
Important Points to Remember for SSH Authentication
If more than one method is enabled, the order in which the methods are preferred is based on the
ssh_config file on the Unix machine.
When all the three authentication methods are enabled, password authentication is the backup method
when the RSA method fails.
The files known_hosts and known_hosts2 are generated when a user tries to SSH using version 1 or
version 2, respectively.
SSH Authentication by Password
Authenticate an SSH client by prompting for a password when attempting to connect to the Dell Force10
system. This is the simplest methods of authentication and uses SSH version 1.
Enable SSH password authentication using the command
CONFIGURATION mode. View your SSH configuration using the command
Privilege mode.
|
Security
806
Configure the maximum number of incoming SSH connections per
Configure the size of the server-generated RSA SSHv1 key.
Specify the file to be used for host-based authentication.
Specify the rhost file to be used for host-based authorization.
Enable RSA authentication for the SSHv2 server.
Add keys for the RSA authentication.
Display the public part of the SSH host-keys.
Display the client public keys used in host-based authentication.
Display the authorized-keys for the RSA authentication.
: Open an SSH connection to the peer RPM.
Enable hostbased-authentication for the SSHv2 server.
Enable password authentication for the SSH server.
ip ssh password-authentication enable
ip ssh server enable
.
show ip ssh
from EXEC
from

Advertisement

Table of Contents
loading

Table of Contents