Admin Guide
Table Of Contents
- Contents
- Chapter 1: Introduction
- Chapter 2: New in this document
- Chapter 3: Basic administration
- Chapter 4: System startup fundamentals
- Chapter 5: Boot parameter configuration using ACLI
- Chapter 6: Run-time process management using ACLI
- Chapter 7: Chassis operations
- Chassis operations fundamentals
- Chassis operations configuration using ACLI
- Enabling jumbo frames
- Configuring port lock
- Configuring SONMP
- Viewing the topology message status
- Associating a port to a VRF instance
- Configuring an IP address for the management port
- Configuring Ethernet ports with Autonegotiation
- Enabling channelization
- Configuring serial management port dropping
- Controlling slot power
- Enabling or disabling the USB port
- Chassis operations configuration using EDM
- Editing system information
- Editing chassis information
- Configuring system flags
- Configuring channelization
- Configuring basic port parameters
- Viewing the boot configuration
- Configuring boot flags
- Enabling Jumbo frames
- Configuring the date and time
- Associating a port to a VRF instance
- Configuring CP Limit
- Configuring an IP address for the management port
- Editing the management port parameters
- Configuring the management port IPv6 interface parameters
- Configuring management port IPv6 addresses
- Auto reactivating the port of the SLPP shutdown
- Editing serial port parameters
- Enabling port lock
- Locking a port
- Viewing power information
- Viewing power status on VSP 8400
- Viewing fan information
- Viewing topology status information
- Viewing the topology message status
- Configuring a forced message control pattern
- Chapter 8: Hardware status using EDM
- Chapter 9: Domain Name Service
- Chapter 10: Licensing
- Chapter 11: Network Time Protocol
- Chapter 12: Secure Shell
- Secure Shell fundamentals
- Secure Shell configuration using ACLI
- Downloading the software
- Enabling the SSHv2 server
- Changing the SSH server authentication mode
- Setting SSH configuration parameters
- Verifying and displaying SSH configuration information
- Connecting to a remote host using the SSH client
- Generating user key files
- Managing an SSL certificate
- Disabling SFTP without disabling SSH
- Enabling SSH rekey
- Configuring SSH rekey data-limit
- Configuring SSH rekey time-interval
- Displaying SSH rekey information
- Downgrading or upgrading from releases that support different key sizes
- Secure Shell configuration using Enterprise Device Manager
- Chapter 13: System access
- System access fundamentals
- System access configuration using ACLI
- Enabling ACLI access levels
- Changing passwords
- Configuring an access policy
- Specifying a name for an access policy
- Allowing a network access to the switch
- Configuring access policies by MAC address
- System access security enhancements
- Displaying the boot config flags status
- Enabling enhanced secure mode
- Creating accounts for different access levels
- Deleting accounts in enhanced secure mode
- Configuring a password for a specific user
- Returning the system to the factory defaults
- Configuring the password complexity rule
- Configuring the password length rule
- Configuring the change interval rule
- Configuring the reuse rule
- Configuring the maximum number of sessions
- Configuring the maximum age rule
- Configuring the pre- and post-notification rule
- System access configuration using EDM
- Chapter 14: ACLI show command reference
- Access, logon names, and passwords
- Basic switch configuration
- Current switch configuration
- CLI settings
- Ftp-access sessions
- Hardware information
- NTP server statistics
- Power summary
- Power information for power supplies
- System information
- System status (detailed)
- Telnet-access sessions
- Users logged on
- Port egress COS queue statistics
- CPU queue statistics
- Chapter 15: Port numbering and MAC address assignment reference
- Chapter 16: Supported standards, RFCs, and MIBs
- Glossary
Chapter 12: Secure Shell
The following sections describe how to use Secure Shell (SSH) to enable secure communications
support over a network for authentication, encryption, and network integrity.
Secure Shell fundamentals
Methods of remote access such as Telnet or FTP generate unencrypted traffic. Anyone that can see
the network traffic can see all data, including passwords and user names. Secure Shell (SSH) is a
client and server protocol that specifies the way to conduct secure communications over a network.
Secure Shell can replace Telnet and other remote login utilities. Secure File Transfer Protocol
(SFTP) can replace FTP with an encrypted alternative.
Note:
If both SSH and SFTP are concurrently active, you have the ability to disable SFTP while
allowing SSH to remain active. For more information, see Disabling SFTP without disabling
SSH on page 170.
VOSS 5.0 introduces Secure CoPy protocol (SCP) which is a secure file transfer protocol. SCP is
used for securely transferring files between a local host and a remote host. SCP is in off state by
default, but you can turn it on when you enable SSH using the boot config flags command in
the global config mode. VOSS supports SCP only as an SCP server, which means that clients can
send files to the VOSS switch or can request files from the switch. Secure CoPy (SCP) can replace
FTP with an encrypted alternative.
Note:
To enable SSH, enable RSA or DSA authentication, or both using command ssh rsa-auth or
ssh dsa-auth.
Secure Shell supports a variety of the different public and private key encryption schemes available.
Using the public key of the host server, the client and server negotiate to generate a session key
known only to the client and the server. This one-time key encrypts all traffic between the client and
the server. The VSP switch supports Secure Shell version 2 (SSHv2).
Note:
Different releases can support different DSA host key, RSA host key, and DSA user key sizes. If
you need to upgrade or downgrade to an earlier release that does not support the same key
size, you must delete all of the keys from the .ssh directory and generate new keys for SSH. For
more information about supported software, see Release Notes for VSP Operating System
Software, NN47227-401.
January 2017 Administering Avaya VSP 7200 Series and 8000 Series 147
Comments on this document? infodev@avaya.com










