Admin Guide
Table Of Contents
- Contents
- Chapter 1: Introduction
- Chapter 2: New in this release
- Chapter 3: Basic administration
- Chapter 4: System startup fundamentals
- Chapter 5: Boot parameter configuration using ACLI
- Chapter 6: Run-time process management using ACLI
- Chapter 7: Chassis operations
- Chassis operations fundamentals
- Chassis operations configuration using ACLI
- Enabling jumbo frames
- Configuring port lock
- Configuring SONMP
- Viewing the topology message status
- Associating a port to a VRF instance
- Configuring an IP address for the management port
- Configuring Ethernet ports with Autonegotiation
- Enabling channelization
- Configuring serial management port dropping
- Controlling slot power
- Chassis operations configuration using EDM
- Editing system information
- Editing chassis information
- Configuring system flags
- Configuring channelization
- Configuring basic port parameters
- Viewing the boot configuration
- Configuring boot flags
- Enabling Jumbo frames
- Configuring the date and time
- Associating a port to a VRF instance
- Configuring CP Limit
- Configuring an IP address for the management port
- Editing the management port parameters
- Configuring the management port IPv6 interface parameters
- Configuring management port IPv6 addresses
- Auto reactivating the port of the SLPP shutdown
- Editing serial port parameters
- Enabling port lock
- Locking a port
- Viewing power information
- Viewing power status on VSP 8400
- Viewing fan information
- Viewing topology status information
- Viewing the topology message status
- Configuring a forced message control pattern
- Chapter 8: Hardware status using EDM
- Chapter 9: Domain Name Service
- Chapter 10: Licensing
- Chapter 11: Network Time Protocol
- Chapter 12: Secure Shell
- Chapter 13: System access
- System access fundamentals
- System access configuration using ACLI
- Enabling ACLI access levels
- Changing passwords
- Configuring an access policy
- Specifying a name for an access policy
- Allowing a network access to the switch
- Configuring access policies by MAC address
- System access security enhancements using ACLI
- Displaying the boot config flags status
- Enabling enhanced secure mode
- Creating accounts for different access levels
- Deleting accounts in enhanced secure mode
- Configuring a password for a specific user
- Returning the system to the factory defaults
- Configuring the password complexity rule
- Configuring the password length rule
- Configuring the change interval rule
- Configuring the reuse rule
- Configuring the maximum number of sessions
- Configuring the maximum age rule
- Configuring the pre- and post-notification rule
- System access configuration using EDM
- Chapter 14: ACLI show command reference
- Access, logon names, and passwords
- Basic switch configuration
- Current switch configuration
- CLI settings
- Ftp-access sessions
- Hardware information
- NTP server statistics
- Power summary
- Power information for power supplies
- System information
- System status (detailed)
- Telnet-access sessions
- Users logged on
- Port egress COS queue statistics
- CPU queue statistics
- Chapter 15: Port numbering and MAC address assignment reference
- Chapter 16: Supported standards, RFCs, and MIBs
- Glossary
Important:
Do not enable SSHv2 secure mode using Configuration and Orchestration Manager (COM). If
you enable SSHv2 secure mode, then the system disables Simple Network Management
Protocol (SNMP). This locks you out of a COM session. Enable SSH secure mode using ACLI
or EDM.
SSHv2 secure mode is different from enhanced secure mode and hsecure. SSHv2 secure
mode disables unsecure management protocols on the device such as FTP, rlogin, SNMP,
telnet and TFTP. SSHv2 secure mode is enabled through the ssh secure command.
When you enable SSHv2 secure mode, the system disables FTP, rlogin, SNMPv1, SNMPv2,
SNMPv3, telnet and TFTP. After SSHv2 secure mode is enabled, you can choose to enable
individual non-secure protocols. However, after you save the configuration and restart the
system, the non-secure protocol is again disabled, even though it is shown as enabled in the
configuration file. After you enable SSHv2 secure mode, you cannot enable non-secure
protocols by disabling SSHv2 secure mode.
You can disable block-snmp after you enable SSHv2 secure mode, and you will be able to
connect using COM again.
SSHv2 support for IPv6
On IPv6 networks, the VSP switch supports SSHv2 server only. The VSP switch does not support
outbound SSHv2 client over IPv6. On IPv4 networks, the VSP switch supports both SSHv2 server
and SSHv2 client.
Interoperability
The VSP SSHv2 client can operate with the following SSHv2 servers:
• Another Avaya Virtual Services Platform 8000 Series
• ERS 8600/8800
• VSP 4000
• Linux running Open SSH
• VSP 7000
• VSP 7200
• VSP 9000
Outbound connections
The SSHv2 client supports SSHv2 DSA public key authentication and password authentication.
Note:
You must enable SSH globally before you can generate SSH DSA user keys.
The SSHv2 client is a secure replacement for outbound Telnet. Password authentication is the
easiest way to use the SSHv2 client feature. With the VSP modular switch, you can use the SSHv2
client feature as shown in the following example:
Linux/PC ssh (password) > VSP ssh (password) > VSP ssh (password) > VSP
Instead of password authentication, you can use DSA public key authentication between the VSP
SSHv2 client and an SSHv2 server. Before you can perform a public key authentication, you must
generate the key pair files and distribute the key files to all the SSHv2 server systems. Because
Secure Shell
October 2015 Administering Avaya VSP 7200 Series and 8000 Series 142
Comments on this document? infodev@avaya.com










