02.10.2013 Views

FTOS Configuration Guide for the C-Series - Force10 Networks

FTOS Configuration Guide for the C-Series - Force10 Networks

FTOS Configuration Guide for the C-Series - Force10 Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

This example shows <strong>the</strong> use of SCP and SSH to copy a software image from one switch running SSH<br />

Server on UDP port 99 to <strong>the</strong> local switch:<br />

Figure 75 Using SCP to copy from an SSH Server on ano<strong>the</strong>r Switch<br />

.<strong>Force10</strong>#copy scp: flash:<br />

Address or name of remote host []: 10.10.10.1<br />

Port number of <strong>the</strong> server [22]: 99<br />

Source file name []: test.cfg<br />

User name to login remote host: admin<br />

Password to login remote host:<br />

Destination file name [test.cfg]: test1.cfg<br />

O<strong>the</strong>r SSH-related commands include:<br />

• crypto key generate: Generate keys <strong>for</strong> <strong>the</strong> SSH server.<br />

• debug ip ssh: Enables collecting SSH debug in<strong>for</strong>mation.<br />

• ip scp topdir: Identify a location <strong>for</strong> files used in secure copy transfer.<br />

• ip ssh au<strong>the</strong>ntication-retries: Configure <strong>the</strong> maximum number of attempts that should be used to<br />

au<strong>the</strong>nticate a user.<br />

• ip ssh connection-rate-limit: Configure <strong>the</strong> maximum number of incoming SSH connections per<br />

minute.<br />

• ip ssh hostbased-au<strong>the</strong>ntication enable: Enable hostbased-au<strong>the</strong>ntication <strong>for</strong> <strong>the</strong> SSHv2 server.<br />

• ip ssh key-size: Configure <strong>the</strong> size of <strong>the</strong> server-generated RSA SSHv1 key.<br />

• ip ssh password-au<strong>the</strong>ntication enable: Enable password au<strong>the</strong>ntication <strong>for</strong> <strong>the</strong> SSH server.<br />

• ip ssh pub-key-file: Specify <strong>the</strong> file to be used <strong>for</strong> host-based au<strong>the</strong>ntication.<br />

• ip ssh rhostsfile: Specify <strong>the</strong> rhost file to be used <strong>for</strong> host-based authorization.<br />

• ip ssh rsa-au<strong>the</strong>ntication enable: Enable RSA au<strong>the</strong>ntication <strong>for</strong> <strong>the</strong> SSHv2 server.<br />

• ip ssh rsa-au<strong>the</strong>ntication: Add keys <strong>for</strong> <strong>the</strong> RSA au<strong>the</strong>ntication.<br />

• show crypto: Display <strong>the</strong> public part of <strong>the</strong> SSH host-keys.<br />

• show ip ssh client-pub-keys: Display <strong>the</strong> client public keys used in host-based au<strong>the</strong>ntication.<br />

• show ip ssh rsa-au<strong>the</strong>ntication: Display <strong>the</strong> authorized-keys <strong>for</strong> <strong>the</strong> RSA au<strong>the</strong>ntication.<br />

• ssh-peer-rpm: Open an SSH connection to <strong>the</strong> peer RPM.<br />

SSH with IPv6<br />

<strong>FTOS</strong> supports both inbound and outbound SSH sessions using IPv6 addressing. Inbound SSH supports<br />

accessing <strong>the</strong> system through <strong>the</strong> management interface as well as through a physical Layer 2 or Layer 3<br />

interface.<br />

160 Security

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!