Admin Guide
Table Of Contents
- Contents
- Chapter 1: Introduction
- Chapter 2: New in this document
- Chapter 3: Basic administration
- Chapter 4: System startup fundamentals
- Chapter 5: Boot parameter configuration using ACLI
- Chapter 6: Run-time process management using ACLI
- Chapter 7: Chassis operations
- Chassis operations fundamentals
- Chassis operations configuration using ACLI
- Enabling jumbo frames
- Configuring port lock
- Configuring SONMP
- Viewing the topology message status
- Associating a port to a VRF instance
- Configuring an IP address for the management port
- Configuring Ethernet ports with Autonegotiation
- Enabling channelization
- Configuring serial management port dropping
- Controlling slot power
- Enabling or disabling the USB port
- Chassis operations configuration using EDM
- Editing system information
- Editing chassis information
- Configuring system flags
- Configuring channelization
- Configuring basic port parameters
- Viewing the boot configuration
- Configuring boot flags
- Enabling Jumbo frames
- Configuring the date and time
- Associating a port to a VRF instance
- Configuring CP Limit
- Configuring an IP address for the management port
- Editing the management port parameters
- Configuring the management port IPv6 interface parameters
- Configuring management port IPv6 addresses
- Auto reactivating the port of the SLPP shutdown
- Editing serial port parameters
- Enabling port lock
- Locking a port
- Viewing power information
- Viewing power status on VSP 8400
- Viewing fan information
- Viewing topology status information
- Viewing the topology message status
- Configuring a forced message control pattern
- Chapter 8: Hardware status using EDM
- Chapter 9: Domain Name Service
- Chapter 10: Licensing
- Chapter 11: Network Time Protocol
- Chapter 12: Secure Shell
- Secure Shell fundamentals
- Secure Shell configuration using ACLI
- Downloading the software
- Enabling the SSHv2 server
- Changing the SSH server authentication mode
- Setting SSH configuration parameters
- Verifying and displaying SSH configuration information
- Connecting to a remote host using the SSH client
- Generating user key files
- Managing an SSL certificate
- Disabling SFTP without disabling SSH
- Enabling SSH rekey
- Configuring SSH rekey data-limit
- Configuring SSH rekey time-interval
- Displaying SSH rekey information
- Downgrading or upgrading from releases that support different key sizes
- Secure Shell configuration using Enterprise Device Manager
- Chapter 13: System access
- System access fundamentals
- System access configuration using ACLI
- Enabling ACLI access levels
- Changing passwords
- Configuring an access policy
- Specifying a name for an access policy
- Allowing a network access to the switch
- Configuring access policies by MAC address
- System access security enhancements
- Displaying the boot config flags status
- Enabling enhanced secure mode
- Creating accounts for different access levels
- Deleting accounts in enhanced secure mode
- Configuring a password for a specific user
- Returning the system to the factory defaults
- Configuring the password complexity rule
- Configuring the password length rule
- Configuring the change interval rule
- Configuring the reuse rule
- Configuring the maximum number of sessions
- Configuring the maximum age rule
- Configuring the pre- and post-notification rule
- System access configuration using EDM
- Chapter 14: ACLI show command reference
- Access, logon names, and passwords
- Basic switch configuration
- Current switch configuration
- CLI settings
- Ftp-access sessions
- Hardware information
- NTP server statistics
- Power summary
- Power information for power supplies
- System information
- System status (detailed)
- Telnet-access sessions
- Users logged on
- Port egress COS queue statistics
- CPU queue statistics
- Chapter 15: Port numbering and MAC address assignment reference
- Chapter 16: Supported standards, RFCs, and MIBs
- Glossary
Mozilla Firefox to view the certificate. If you cannot connect to the switch using HTTPS and the web
portal displays a message of invalid certificate, that is an indication that the certificate on the switch
is expired. You can replace the host.cert and host.key files with new files generated off the switch,
or you can use the procedure
Managing an SSL certificate on page 169 to generate a new
certificate on the switch with a specific validity period.
The default certificate key length for a certificate generated on the switch is 2,048 bits.
SSH rekeying
SSH rekeying is an SSHv2 feature that allows the SSH server/client to force a key exchange
between server and client, changing the encryption and integrity keys. Once you enable SSH
rekeying, key exchanges occur after a pre-determined time interval or after the data transmitted in
the session reaches the data-limit threshold.
SSH rekeying occurs when either the time-interval or data-limit value is met. The default time-
interval is 1 hour and the default data-limit is 1 GB. These values are configurable using the ssh
rekey command.
SSH rekey is optional. You can enable SSH rekey only when global SSH is enabled. Most SSH
clients and servers do not provide a rekey mechanism; in that case, you should not enable SSH
rekey. Active sessions shut down if the rekey fails.
SSH rekeying
SSH rekeying is an SSHv2 feature that allows the SSH server/client to force a key exchange
between server and client, while changing the encryption and integrity keys. When you enable SSH
rekeying, key exchanges occur after a pre-determined time interval or after the data transmitted in
the session reaches the data-limit threshold. The default time-interval is 1 hour and the default data-
limit is 1 GB. You can configure these values using the ssh rekey command.
SSH rekey is optional. You can enable SSH rekey only when SSH is enabled globally. Most SSH
clients and servers do not provide a rekey mechanism, do not enable SSH rekey in such cases.
Note:
You cannot enable SSH rekey selectively for either SSH client or server, it is enabled both on
the SSH client and server together.
Secure Shell configuration using ACLI
Use Secure Shell version 2 (SSHv2) to enable secure communications support over a network for
authentication, encryption, and network Integrity.
On IPv6 networks, the VSP switch supports SSHv2 server only. The VSP switch does not support
outbound SSHv2 client over IPv6. On IPv4 networks, the VSP switch supports both SSHv2 server
and SSHv2 client.
Secure Shell
January 2017 Administering Avaya VSP 7200 Series and 8000 Series 158
Comments on this document? infodev@avaya.com










