Admin Guide
Table Of Contents
- Contents
- Chapter 1: Introduction
- Chapter 2: New in this release
- Chapter 3: Basic administration
- Chapter 4: System startup fundamentals
- Chapter 5: Boot parameter configuration using ACLI
- Chapter 6: Run-time process management using ACLI
- Chapter 7: Chassis operations
- Chassis operations fundamentals
- Chassis operations configuration using ACLI
- Enabling jumbo frames
- Configuring port lock
- Configuring SONMP
- Viewing the topology message status
- Associating a port to a VRF instance
- Configuring an IP address for the management port
- Configuring Ethernet ports with Autonegotiation
- Enabling channelization
- Configuring serial management port dropping
- Controlling slot power
- Chassis operations configuration using EDM
- Editing system information
- Editing chassis information
- Configuring system flags
- Configuring channelization
- Configuring basic port parameters
- Viewing the boot configuration
- Configuring boot flags
- Enabling Jumbo frames
- Configuring the date and time
- Associating a port to a VRF instance
- Configuring CP Limit
- Configuring an IP address for the management port
- Editing the management port parameters
- Configuring the management port IPv6 interface parameters
- Configuring management port IPv6 addresses
- Auto reactivating the port of the SLPP shutdown
- Editing serial port parameters
- Enabling port lock
- Locking a port
- Viewing power information
- Viewing power status on VSP 8400
- Viewing fan information
- Viewing topology status information
- Viewing the topology message status
- Configuring a forced message control pattern
- Chapter 8: Hardware status using EDM
- Chapter 9: Domain Name Service
- Chapter 10: Licensing
- Chapter 11: Network Time Protocol
- Chapter 12: Secure Shell
- Chapter 13: System access
- System access fundamentals
- System access configuration using ACLI
- Enabling ACLI access levels
- Changing passwords
- Configuring an access policy
- Specifying a name for an access policy
- Allowing a network access to the switch
- Configuring access policies by MAC address
- System access security enhancements using ACLI
- Displaying the boot config flags status
- Enabling enhanced secure mode
- Creating accounts for different access levels
- Deleting accounts in enhanced secure mode
- Configuring a password for a specific user
- Returning the system to the factory defaults
- Configuring the password complexity rule
- Configuring the password length rule
- Configuring the change interval rule
- Configuring the reuse rule
- Configuring the maximum number of sessions
- Configuring the maximum age rule
- Configuring the pre- and post-notification rule
- System access configuration using EDM
- Chapter 14: ACLI show command reference
- Access, logon names, and passwords
- Basic switch configuration
- Current switch configuration
- CLI settings
- Ftp-access sessions
- Hardware information
- NTP server statistics
- Power summary
- Power information for power supplies
- System information
- System status (detailed)
- Telnet-access sessions
- Users logged on
- Port egress COS queue statistics
- CPU queue statistics
- Chapter 15: Port numbering and MAC address assignment reference
- Chapter 16: Supported standards, RFCs, and MIBs
- Glossary
Table 38: DSA authentication access level and file name
Client key format or WSM Access level File name
Client key in non IETF and IETF format
with enhanced secure mode disabled
Note:
The VSP switch supports IETF and
non-IETF for DSA.
RWA /intflash/.ssh/dsa_key_rwa
RW /intflash/.ssh/dsa_key_rw
RO /intflash/.ssh/dsa_key_ro
L3 /intflash/.ssh/dsa_key_rwl3
L2 /intflash/.ssh/dsa_key_rwl2
L1 /intflash/.ssh/dsa_key_rwl1
Client key in enhanced secure mode
administrator /intflash/.ssh/dsa_key_admin
operator /intflash/.ssh/dsa_key_operator
security /intflash/.ssh/dsa_key_security
privilege /intflash/.ssh/dsa_key_priv
auditor /intflash/.ssh/dsa_key_auditor
The VSP modular switch generates an RSA public and private server key pair. The public part of the
key for RSA is stored in /intflash/.ssh/ssh_key_rsa_pub.key. If an RSA key pair does not exist, then
the VSP modular switch automatically generates one when you enable the SSH server. To
authenticate a client using RSA, the administrator must copy the public part of the client RSA key to
the VSP switch.
RSA authentication access level and file name
The following table lists the access levels and file names you can use for storing the SSH client
authentication information using RSA.
Table 39: RSA authentication access level and file name
Client key format or WSM
Access level File name
Client key in IETF format with enhanced
secure mode disabled.
RWA /flash/.ssh/rsa_key_rwa
RW /flash/.ssh/rsa_key_rw
RO /flash/.ssh/rsa_key_ro
L3 /flash/.ssh/rsa_key_rwl3
L2 /flash/.ssh/rsa_key_rwl2
L1 /flash/.ssh/rsa_key_rwl1
Client key with enhanced secure mode
enabled
administrator /intflash/.ssh/rsa_key_admin
operator /intflash/.ssh/rsa_key_operator
security /intflash/.ssh/rsa_key_security
privilege /intflash/.ssh/rsa_key_priv
auditor /intflash/.ssh/rsa_key_auditor
Secure Shell fundamentals
October 2015 Administering Avaya VSP 7200 Series and 8000 Series 149
Comments on this document? infodev@avaya.com










