Concept Guide
• debug ip ssh : enables collecting SSH debug information.
• ip scp topdir : identify a location for les used in secure copy transfer.
• ip ssh authentication-retries : congure the maximum number of attempts that should be used to authenticate a user.
• ip ssh connection-rate-limit : congure the maximum number of incoming SSH connections per minute.
• ip ssh hostbased-authentication enable : enable host-based authentication for the SSHv2 server.
• ip ssh password-authentication enable : enable password authentication for the SSH server.
• ip ssh pub-key-file : specify the le the host-based authentication uses.
• ip ssh rhostsfile : specify the rhost le the host-based authorization uses.
• ip ssh rsa-authentication enable : enable RSA authentication for the SSHv2 server.
• ip ssh rsa-authentication : add keys for the RSA authentication.
• show crypto : display the public part of the SSH host-keys.
• show ip ssh client-pub-keys : display the client public keys used in host-based authentication.
• show ip ssh rsa-authentication : display the authorized-keys for the RSA authentication.
DellEMC#copy scp: flash:
Address or name of remote host []: 10.10.10.1
Port number of the server [22]: 99
Source file name []: test.cfg
User name to login remote host: admin
Password to login remote host:
Secure Shell Authentication
Secure Shell (SSH) is enabled by default using the SSH Password Authentication method.
Conguring the HMAC Algorithm for the SSH Client
To congure the HMAC algorithm for the SSH client, use the ip ssh mac hmac-algorithm command in CONFIGURATION mode.
hmac-algorithm: Enter a space-delimited list of keyed-hash message authentication code (HMAC) algorithms supported by the SSH
server.
The following HMAC algorithms are available:
• hmac-md5
• hmac-md5-96
• hmac-sha1
• hmac-sha1-96
• hmac-sha2-256
The default list of HMAC algorithm is in the following order:
• hmac-sha2-256
• hmac-sha1
• hmac-sha1-96
• hmac-md5
• hmac-md5-96
When FIPS is enabled, the default HMAC algorithm is hmac-sha2-256, hmac-sha1, hmac-sha1-96.
Example of Conguring a HMAC Algorithm
754
Security