Admin Guide
Table Of Contents
- Contents
- Chapter 1: Introduction
- Chapter 2: New in this release
- Chapter 3: Basic administration
- Chapter 4: System startup fundamentals
- Chapter 5: Boot parameter configuration using ACLI
- Chapter 6: Run-time process management using ACLI
- Chapter 7: Chassis operations
- Chassis operations fundamentals
- Chassis operations configuration using ACLI
- Enabling jumbo frames
- Configuring port lock
- Configuring SONMP
- Viewing the topology message status
- Associating a port to a VRF instance
- Configuring an IP address for the management port
- Configuring Ethernet ports with Autonegotiation
- Enabling channelization
- Configuring serial management port dropping
- Controlling slot power
- Chassis operations configuration using EDM
- Editing system information
- Editing chassis information
- Configuring system flags
- Configuring channelization
- Configuring basic port parameters
- Viewing the boot configuration
- Configuring boot flags
- Enabling Jumbo frames
- Configuring the date and time
- Associating a port to a VRF instance
- Configuring CP Limit
- Configuring an IP address for the management port
- Editing the management port parameters
- Configuring the management port IPv6 interface parameters
- Configuring management port IPv6 addresses
- Auto reactivating the port of the SLPP shutdown
- Editing serial port parameters
- Enabling port lock
- Locking a port
- Viewing power information
- Viewing power status on VSP 8400
- Viewing fan information
- Viewing topology status information
- Viewing the topology message status
- Configuring a forced message control pattern
- Chapter 8: Hardware status using EDM
- Chapter 9: Domain Name Service
- Chapter 10: Licensing
- Chapter 11: Network Time Protocol
- Chapter 12: Secure Shell
- Chapter 13: System access
- System access fundamentals
- System access configuration using ACLI
- Enabling ACLI access levels
- Changing passwords
- Configuring an access policy
- Specifying a name for an access policy
- Allowing a network access to the switch
- Configuring access policies by MAC address
- System access security enhancements using ACLI
- Displaying the boot config flags status
- Enabling enhanced secure mode
- Creating accounts for different access levels
- Deleting accounts in enhanced secure mode
- Configuring a password for a specific user
- Returning the system to the factory defaults
- Configuring the password complexity rule
- Configuring the password length rule
- Configuring the change interval rule
- Configuring the reuse rule
- Configuring the maximum number of sessions
- Configuring the maximum age rule
- Configuring the pre- and post-notification rule
- System access configuration using EDM
- Chapter 14: ACLI show command reference
- Access, logon names, and passwords
- Basic switch configuration
- Current switch configuration
- CLI settings
- Ftp-access sessions
- Hardware information
- NTP server statistics
- Power summary
- Power information for power supplies
- System information
- System status (detailed)
- Telnet-access sessions
- Users logged on
- Port egress COS queue statistics
- CPU queue statistics
- Chapter 15: Port numbering and MAC address assignment reference
- Chapter 16: Supported standards, RFCs, and MIBs
- Glossary
User ID log of an SSH session established by SFTP
The VSP modular switch logs the user ID of an SSH session initiated by SFTP. If SFTP establishes
an SSH session, the message appears in the following format:
CP1 [03/12/13 21:49:11.374] 0x000d858b 00000000 GlobalRouter SSH INFO New connection from
ip 10.10.10.98 port 59826
CP1 [03/12/13 21:49:11.377] 0x000d8603 00000000 GlobalRouter SSH INFO Enabling
compatibility mode for protocol 2.0
CP1 [03/12/13 21:49:16.577] 0x000d8602 00000000 GlobalRouter SSH INFO Accepted password
for ROOT from 10.10.10.98 port 59826 ssh2
CP1 [03/12/13 21:49:16.684] 0x000d8589 00000000 GlobalRouter SSH INFO SSH: User rwa
login /dev/pts/16 from 10.10.10.98
• rwa is the user name.
User key files
Generating keys requires that you have free space on the flash. A typical configuration requires less
than 2 kbyte of free space. Before you generate a key, verify that you have sufficient space on the
flash, using the dir command. If the flash is full when you attempt to generate a key, an error
message appears and the key is not generated. You must delete some unused files and regenerate
the key.
If you remove only the public keys, enabling the SSH does not create new public keys.
SSHv2 password authentication uses the same login and password authentication mechanism as
Telnet. SSHv2 client also supports DSA public key authentication compatible with the VSP modular
switch SSHv2 server and Linux SSHv2 server for SSHv2.
If the VSP modular switch is the client, use the following table to locate the DSA user key files for
DSA authentication for user access level rwa.
Table 36: DSA user key files
SSH server
SSH client side SSH server side
VOSS switch with
enhanced secure mode
disabled
Private and public keys by access
level:
• rwa—/intflash/.ssh/id_dsa_rwa
(private key), /intflash/.ssh/
id_dsa_rwa.pub (public key)
• rw—/intflash/.ssh/id_dsa_rw (private
key), /intflash/.ssh/id_dsa_rw.pub
(public key)
• ro—/intflash/.ssh/id_dsa_ro (private
key), /intflash/.ssh/id_dsa_ro.pub
(public key)
• rwl1—/intflash/.ssh/id_dsa_rwl1
(private key), /intflash/.ssh/
id_dsa_rwl1.pub (public key)
• rwl2—/intflash/.ssh/id_dsa_rwl2
(private key), /intflash/.ssh/
id_dsa_rwl2.pub (public key)
Public keys on the server side based
on access level:
• rwa—/intflash/.ssh/dsa_key_rwa
(public key)
• rw—/intflash/.ssh/dsa_key_rw (public
key)
• ro—/intflash/.ssh/dsa_key_ro (public
key)
• rwl1—/intflash/.ssh/dsa_key_rwl1
(public key)
• rwl2—/intflash/.ssh/dsa_key_rwl2
(public key)
• rwl3—/intflash/.ssh/dsa_key_rwl3
(public key)
Table continues…
Secure Shell fundamentals
October 2015 Administering Avaya VSP 7200 Series and 8000 Series 145
Comments on this document? infodev@avaya.com










