Admin Guide
Table Of Contents
- Contents
- Chapter 1: Introduction
- Chapter 2: New in this document
- Chapter 3: Basic administration
- Chapter 4: System startup fundamentals
- Chapter 5: Boot parameter configuration using ACLI
- Chapter 6: Run-time process management using ACLI
- Chapter 7: Chassis operations
- Chassis operations fundamentals
- Chassis operations configuration using ACLI
- Enabling jumbo frames
- Configuring port lock
- Configuring SONMP
- Viewing the topology message status
- Associating a port to a VRF instance
- Configuring an IP address for the management port
- Configuring Ethernet ports with Autonegotiation
- Enabling channelization
- Configuring serial management port dropping
- Controlling slot power
- Enabling or disabling the USB port
- Chassis operations configuration using EDM
- Editing system information
- Editing chassis information
- Configuring system flags
- Configuring channelization
- Configuring basic port parameters
- Viewing the boot configuration
- Configuring boot flags
- Enabling Jumbo frames
- Configuring the date and time
- Associating a port to a VRF instance
- Configuring CP Limit
- Configuring an IP address for the management port
- Editing the management port parameters
- Configuring the management port IPv6 interface parameters
- Configuring management port IPv6 addresses
- Auto reactivating the port of the SLPP shutdown
- Editing serial port parameters
- Enabling port lock
- Locking a port
- Viewing power information
- Viewing power status on VSP 8400
- Viewing fan information
- Viewing topology status information
- Viewing the topology message status
- Configuring a forced message control pattern
- Chapter 8: Hardware status using EDM
- Chapter 9: Domain Name Service
- Chapter 10: Licensing
- Chapter 11: Network Time Protocol
- Chapter 12: Secure Shell
- Secure Shell fundamentals
- Secure Shell configuration using ACLI
- Downloading the software
- Enabling the SSHv2 server
- Changing the SSH server authentication mode
- Setting SSH configuration parameters
- Verifying and displaying SSH configuration information
- Connecting to a remote host using the SSH client
- Generating user key files
- Managing an SSL certificate
- Disabling SFTP without disabling SSH
- Enabling SSH rekey
- Configuring SSH rekey data-limit
- Configuring SSH rekey time-interval
- Displaying SSH rekey information
- Downgrading or upgrading from releases that support different key sizes
- Secure Shell configuration using Enterprise Device Manager
- Chapter 13: System access
- System access fundamentals
- System access configuration using ACLI
- Enabling ACLI access levels
- Changing passwords
- Configuring an access policy
- Specifying a name for an access policy
- Allowing a network access to the switch
- Configuring access policies by MAC address
- System access security enhancements
- Displaying the boot config flags status
- Enabling enhanced secure mode
- Creating accounts for different access levels
- Deleting accounts in enhanced secure mode
- Configuring a password for a specific user
- Returning the system to the factory defaults
- Configuring the password complexity rule
- Configuring the password length rule
- Configuring the change interval rule
- Configuring the reuse rule
- Configuring the maximum number of sessions
- Configuring the maximum age rule
- Configuring the pre- and post-notification rule
- System access configuration using EDM
- Chapter 14: ACLI show command reference
- Access, logon names, and passwords
- Basic switch configuration
- Current switch configuration
- CLI settings
- Ftp-access sessions
- Hardware information
- NTP server statistics
- Power summary
- Power information for power supplies
- System information
- System status (detailed)
- Telnet-access sessions
- Users logged on
- Port egress COS queue statistics
- CPU queue statistics
- Chapter 15: Port numbering and MAC address assignment reference
- Chapter 16: Supported standards, RFCs, and MIBs
- Glossary
SSH server SSH client side SSH server side
• privilege —/intflash/.ssh/id_dsa_priv
(private key), /intflash/.ssh/
id_dsa_priv.pub (public key)
Linux with Open SSH ~/.ssh/id_dsa (private key) file
permission 400
~/.ssh/id_dsa.pub (public key) file
permission 644
~/.ssh/authorized_keys (public key) file
ERS 8600/8800 — /flash/.ssh/dsa_key_rwa (public key)
When you attempt to make an SSH connection from the VSP modular switch, the SSHv2 client
looks in its own internal flash for the public key pair files. If the key files exist, the SSHv2 client
prompts you for the passphrase to decrypt the key files. If the passphrase is correct, the SSHv2
client initiates the DSA key authentication to the remote SSHv2 server. The SSHv2 client looks for
the login user access level public key file on the SSHv2 server to process and validate the public
key authentication. If the DSA authentication is successful, then the SSHv2 session is established.
If no matching user key pair files exist on the client side when initiating the SSHv2 session, or if the
DSA authentication fails, you are automatically prompted for a password to attempt password
authentication.
If the remote SSHv2 server is a Linux system, the server looks for the login user public key file
~/.ssh/authorized_keys by default for DSA authentication. For Linux SSH client, the user DSA key
pair files are located in the user home directory as ~/.ssa/id_dsa and ~/.ssa/id_dsa.pub.
Block SNMP
The boot flag setting for block-snmp (boot config flags block-snmp) and the runtime
configuration of SSH secure (ssh secure) each modify the block-snmp boot flag. If you enable
SSH secure mode, the system automatically sets the block-snmp boot flag to true; the change takes
effect immediately. After enabling SSH in secure mode, you can manually change the block-snmp
flag to false to allow both SSH and SNMP access.
Important:
The block flag setting for block-snmp blocks Simple Network Management Protocol (SNMP)v1,
SNMPv2, and SNMPv3.
SCP command
Avaya recommends that you use short file names with the Secure CoPy (SCP) command. The
entire SCP command, including all options, user names, and file names must not exceed 80
characters. Avaya supports incoming SCP connections to the device but does not support outgoing
connections using an SCP client from the device
Third-party SSH and SCP client software
The following table describes the third-party SSH and SCP client software that has been tested but
is not included with this release.
Secure Shell
January 2017 Administering Avaya VSP 7200 Series and 8000 Series 154
Comments on this document? infodev@avaya.com










