Users Guide

802.1x information on Te 1/49:
-----------------------------
Dot1x Status: Enable
Port Control: FORCE_AUTHORIZED
Port Auth Status: UNAUTHORIZED
Re-Authentication: Disable
Untagged VLAN id: None
Guest VLAN: Disable
Guest VLAN id: NONE
Auth-Fail VLAN: Disable
Auth-Fail VLAN id: NONE
Auth-Fail Max-Attempts: NONE
Mac-Auth-Bypass: Disable
Mac-Auth-Bypass Only: Disable
Tx Period: 30 seconds
Quiet Period: 60 seconds
ReAuth Max: 2
Supplicant Timeout: 30 seconds
Server Timeout: 30 seconds
Re-Auth Interval: 3600 seconds
Max-EAP-Req: 2
Host Mode: SINGLE_HOST
Auth PAE State: Initialize
Backend State: Initialize
Dell#
SSH and SCP Commands
Dell Networking OS supports secure shell (SSH) protocol versions 1.5 and 2.0. SSH is a protocol for secure remote login over an insecure
network. SSH sessions are encrypted and use authentication.
crypto key generate
Generate keys for the SSH server.
Syntax
NOTE: Some of the parameters in this command require licensing to access. For more information,
contact your Dell Networking representative.
crypto key generate {rsa | rsa1}
Parameters
rsa Enter the keyword rsa then the key size to generate a SSHv2 RSA host keys. The range
is from 1024 to 2048 if you did not enable FIPS mode; if you enabled FIPS mode, you can
only generate a 2048-bit key. The default is 1024.
NOTE: You must have a license to access the FIPS mode. For more
information, contact your Dell Networking representative.
rsa1 Enter the keyword rsa1 then the key size to generate a SSHv1 RSA host keys. The
range is from 1024 to 2048. The default is 1024.
NOTE: This option is not available in FIPS mode.
Defaults Key size 1024; if you enable FIPS mode, the key size is 2048.
Command Modes CONFIGURATION
Command History
This guide is platform-specific. For command information about other platforms, see the relevant Dell Networking
OS Command Line Reference Guide.
Version Description
9.8(2.0) Introduced on the S3100 series.
9.8(1.0) Introduced on the Z9100-ON.
Security 1207