Admin Guide

Table Of Contents
User ID log of an SSH session established by SFTP
The VSP modular switch logs the user ID of an SSH session initiated by SFTP. If SFTP establishes
an SSH session, the message appears in the following format:
CP1 [03/12/13 21:49:11.374] 0x000d858b 00000000 GlobalRouter SSH INFO New connection from
ip 10.10.10.98 port 59826
CP1 [03/12/13 21:49:11.377] 0x000d8603 00000000 GlobalRouter SSH INFO Enabling
compatibility mode for protocol 2.0
CP1 [03/12/13 21:49:16.577] 0x000d8602 00000000 GlobalRouter SSH INFO Accepted password
for ROOT from 10.10.10.98 port 59826 ssh2
CP1 [03/12/13 21:49:16.684] 0x000d8589 00000000 GlobalRouter SSH INFO SSH: User rwa
login /dev/pts/16 from 10.10.10.98
rwa is the user name.
User key files
Generating keys requires that you have free space on the flash. A typical configuration requires less
than 2 kbyte of free space. Before you generate a key, verify that you have sufficient space on the
flash, using the dir command. If the flash is full when you attempt to generate a key, an error
message appears and the key is not generated. You must delete some unused files and regenerate
the key.
If you remove only the public keys, enabling the SSH does not create new public keys.
SSHv2 password authentication uses the same login and password authentication mechanism as
Telnet. SSHv2 client also supports DSA public key authentication compatible with the VSP modular
switch SSHv2 server and Linux SSHv2 server for SSHv2.
If the VSP modular switch is the client, use the following table to locate the DSA user key files for
DSA authentication for user access level rwa.
Table 36: DSA user key files
SSH server
SSH client side SSH server side
VOSS switch with
enhanced secure mode
disabled
Private and public keys by access
level:
rwa—/intflash/.ssh/id_dsa_rwa
(private key), /intflash/.ssh/
id_dsa_rwa.pub (public key)
rw—/intflash/.ssh/id_dsa_rw (private
key), /intflash/.ssh/id_dsa_rw.pub
(public key)
ro—/intflash/.ssh/id_dsa_ro (private
key), /intflash/.ssh/id_dsa_ro.pub
(public key)
rwl1—/intflash/.ssh/id_dsa_rwl1
(private key), /intflash/.ssh/
id_dsa_rwl1.pub (public key)
rwl2—/intflash/.ssh/id_dsa_rwl2
(private key), /intflash/.ssh/
id_dsa_rwl2.pub (public key)
Public keys on the server side based
on access level:
rwa—/intflash/.ssh/dsa_key_rwa
(public key)
rw—/intflash/.ssh/dsa_key_rw (public
key)
ro—/intflash/.ssh/dsa_key_ro (public
key)
rwl1—/intflash/.ssh/dsa_key_rwl1
(public key)
rwl2—/intflash/.ssh/dsa_key_rwl2
(public key)
rwl3—/intflash/.ssh/dsa_key_rwl3
(public key)
Table continues…
Secure Shell fundamentals
October 2015 Administering Avaya VSP 7200 Series and 8000 Series 145
Comments on this document? infodev@avaya.com