Admin Guide

Table Of Contents
Important:
Do not enable SSHv2 secure mode using Configuration and Orchestration Manager (COM). If
you enable SSHv2 secure mode, then the system disables Simple Network Management
Protocol (SNMP). This locks you out of a COM session. Enable SSH secure mode using ACLI
or EDM.
SSHv2 secure mode is different from enhanced secure mode and hsecure. SSHv2 secure
mode disables unsecure management protocols on the device such as FTP, rlogin, SNMP,
telnet and TFTP. SSHv2 secure mode is enabled through the ssh secure command.
When you enable SSHv2 secure mode, the system disables FTP, rlogin, SNMPv1, SNMPv2,
SNMPv3, telnet and TFTP. After SSHv2 secure mode is enabled, you can choose to enable
individual non-secure protocols. However, after you save the configuration and restart the
system, the non-secure protocol is again disabled, even though it is shown as enabled in the
configuration file. After you enable SSHv2 secure mode, you cannot enable non-secure
protocols by disabling SSHv2 secure mode.
You can disable block-snmp after you enable SSHv2 secure mode, and you will be able to
connect using COM again.
SSHv2 support for IPv6
On IPv6 networks, the VSP switch supports SSHv2 server only. The VSP switch does not support
outbound SSHv2 client over IPv6. On IPv4 networks, the VSP switch supports both SSHv2 server
and SSHv2 client.
Interoperability
The VSP SSHv2 client can operate with the following SSHv2 servers:
Another Avaya Virtual Services Platform 8000 Series
ERS 8600/8800
VSP 4000
Linux running Open SSH
VSP 7000
VSP 7200
VSP 9000
Outbound connections
The SSHv2 client supports SSHv2 DSA public key authentication and password authentication.
Note:
You must enable SSH globally before you can generate SSH DSA user keys.
The SSHv2 client is a secure replacement for outbound Telnet. Password authentication is the
easiest way to use the SSHv2 client feature. With the VSP modular switch, you can use the SSHv2
client feature as shown in the following example:
Linux/PC ssh (password) > VSP ssh (password) > VSP ssh (password) > VSP
Instead of password authentication, you can use DSA public key authentication between the VSP
SSHv2 client and an SSHv2 server. Before you can perform a public key authentication, you must
generate the key pair files and distribute the key files to all the SSHv2 server systems. Because
Secure Shell
October 2015 Administering Avaya VSP 7200 Series and 8000 Series 142
Comments on this document? infodev@avaya.com