Rsa Authentication Of Ssh - Dell Force10 C150 Configuration Manual

Ftos configuration guide ftos 8.4.2.7 e-series terascale, c-series, s-series (s50/s25)
Hide thumbs Also See for Force10 C150:
Table of Contents

Advertisement

Figure 45-8. Enabling SSH Password Authentication
FTOS(conf)#ip ssh server enable
FTOS(conf)#ip ssh password-authentication enable
FTOS#sh ip ssh
SSH server
Password
Authentication
Hostbased Authentication
RSA
Authentication

RSA Authentication of SSH

The following procedure authenticates an SSH client based on an RSA key using RSA authentication. This
method uses SSH version 2:
Step
Task
1
On the SSH client (Unix machine), generate an RSA key, as shown in
Figure 45-9. Generating RSA Keys
admin@Unix_client#ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/admin/.ssh/id_rsa):
/home/admin/.ssh/id_rsa already exists.
Overwrite (y/n)? y
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/admin/.ssh/id_rsa.
Your public key has been saved in /home/admin/.ssh/id_rsa.pub.
2
Copy the public key id_rsa.pub to the Dell Force10 system.
3
Disable password authentication if enabled.
4
Enable RSA authentication.
5
Bind the public keys to RSA authentication.
Host-based SSH Authentication
Authenticate a particular host. This method uses SSH version 2.
% Please wait while SSH Daemon initializes ... done.
: enabled.
: enabled.
: disabled.
: disabled.
Command Syntax
Figure
no ip ssh password-authentication
enable
ip ssh rsa-authentication enable
ip ssh rsa-authentication
my-authorized-keys flash://
public_key
Command Mode
45-9.
CONFIGURATION
EXEC Privilege
EXEC Privilege
Security | 939

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents