Admin Guide

Table Of Contents
Variable Value
To disable all authentication types use the command no ssh
authentication-type.
dsa-auth Enables or disables the DSA authentication. The default is enabled. Use
the no operator before this parameter, no ssh dsa-auth, to disable DSA
authentication.
dsa-host-key [<1024–1024>] Generates a new SSH DSA host key. The DSA host key size is 1024. Use
the no operator before this parameter, no ssh dsa-host-key, to
disable SSH DSA host key.
dsa-user-key WORD <1–15> Generates a new SSH DSA user key. WORD<1–15> specifies the user
access level.
You must enable SSH globally before you can generate SSH DSA user
keys.
If enhanced secure mode is disabled, the valid user access levels for the
switch are:
rwa — Specifies read-write-all.
rw — Specifies read-write.
ro — Specifies read-only.
rwl1 — Specifies read-write for Layer 1.
rwl2 — Specifies read-write for Layer 2.
rwl3 — Specifies read-write for Layer 3.
If you enable enhanced secure mode, the switch uses role-based
authentication. You associate each username with a specific role and the
appropriate authorization rights to commands based on that role.
If enhanced secure mode is enabled, the value user access levels for the
switch are:
admin—Specifies a user role with access to all of the configurations,
show commands, and the ability to view the log file and security
commands. The administrator role is the highest level of user roles.
operator—Specifies a user role with access to all of the configurations for
packet forwarding on Layer 2 and Layer 3, and has access to show
commands to view the configuration, but cannot view the audit logs and
cannot access security and password commands.
auditor—Specifies a user role that can view log files and view all
configurations, except password configuration.
security—Specifies a user role with access only to security settings and
the ability to view the configurations.
priv—Specifies a user role with access to all of the commands that the
administrator has access to, and is referred to as an emergency-admin.
However, the user with the privilege role must be authenticated within the
VSP switch locally. RADIUS and TACACS+ authentication is not
Table continues…
Secure Shell configuration using ACLI
January 2017 Administering Avaya VSP 7200 Series and 8000 Series 163
Comments on this document? infodev@avaya.com