Ssh Configuration; Scp Protocol Support - Avaya G250 Administration

Media gateway
Hide thumbs Also See for G250:
Table of Contents

Advertisement

RSA authentication works as follows:
The G250/G350 generates a key of variable length (512-2048 bits) using the DSA
encryption method. This is the private key.
The G250/G350 calculates an MD5 Hash of the private key, called a fingerprint (the public
key). The fingerprint is always 16 bytes long. This fingerprint is displayed.
The G250/G350 sends the public key (the fingerprint) to the client computer. This public
key is used by the client to encrypt the data it sends to the G250/G350. The G250/G350
decrypts the data using the private key.
Both sides negotiate and must agree on the same chipper type. The G250/G350 only
supports 3DES-CBC encryption. The user on the client side accepts the fingerprint. The
client maintains a cache containing a list of fingerprints per server IP address. If the
information in this cache changes, the client notifies the user.
The client chooses a random number that is used to encrypt and decrypt the information
sent.
This random number is sent to the G250/G350, after encryption based on the G250/
G350's public key.
When the G250/G350 receives the encrypted random number, it decrypts it using the
private key. This random number is now used with the 3DES-CBC encryption method for
all encryption and decryption of data. The public and private keys are no longer used.
Password authentication works as follows:
Before any data is transferred, the G250/G350 requires the client to supply a user name
and password. This authenticates the user on the client side to the G250/G350.

SSH Configuration

Use the ip ssh command to enable SSH authentication. Use the no form of this command to
disable the SSH server. Disabling the server disconnects all active SSH sessions. By default,
SSH is enabled.
Use the crypto key generate dsa command to generate an SSH host key pair.
Use the show ip ssh command to display SSH configuration information and information
about any active SSH sessions.
Use the disconnect ssh command to disconnect an existing SSH session.

SCP protocol support

In addition to data transfer via an SSH session, the SSH protocol is used to support SCP for
secure file transfer. When using SCP, the G250/G350 is the client, and an SCP server must be
installed on the management station. After users are defined on the SCP server, the G250/
G350 acts as an SCP client.
Managing login permissions
Issue 1.1 June 2005
45

Advertisement

Table of Contents
loading

This manual is also suitable for:

G350

Table of Contents