
BigIron RX Series Configuration Guide
915
53-1002253-01
Configuring SSH
30
•
DSA challenge-response authentication
, where a collection of public keys are stored on the
device. Only clients with a private key that corresponds to one of the stored public keys can
gain access to the device using SSH.
•
Password authentication
, where users attempting to gain access to the device using an SSH
client are authenticated with passwords stored on the device or on a TACACS, or
RADIUS server
Both kinds of user authentication are enabled by default. You can configure the device to use one
or both of them.
To configure Secure Shell on a device, do the following.
1. Generate a host DSA public and private key pair for the device.
2. Configure DSA challenge-response authentication.
3. Set optional parameters.
You can also view information about active SSH connections on the device as well as terminate
them.
Generating a host key pair
When SSH is configured, a public and private
host DSA key pair
is generated for the device. The
SSH server on the device uses this host DSA key pair, along with a dynamically generated
server
DSA key pair
, to negotiate a session key and encryption method with the client trying to connect to
it.
The host DSA key pair is stored in the device’s system-config file. Only the public key is readable.
The public key should be added to a “known hosts” file (for example, $HOME/.ssh/known_hosts on
UNIX systems) on the clients who want to access the device. Some SSH client programs add the
public key to the known hosts file automatically; in other cases, you must manually create a known
hosts file and place the device’s public key in it. Refer to
“Providing the public key to clients”
on
page 916 for an example of what to place in the known hosts file.
While the SSH listener exists at all times, sessions can't be started from clients until a key is
generated. Once a key is generated, clients can start sessions. The keys are also not displayed in
the configuration file by default. To display the keys, use the ssh show-host-keys command in
Privileged EXEC mode. To generate a public and private DSA host key pair on a device, enter the
following commands.
BigIron RX(config)# crypto key generate
When a host key pair is generated, it is saved to the flash memory of all management modules.
To disable SSH in SSHv2 on a device, enter the following commands.
BigIron RX(config)# crypto key zeroize
When SSH is disabled, it is deleted from the flash memory of all management modules.
Syntax: crypto key generate | zeroize
The generate keyword places an DSA host key pair in the flash memory and enables SSH on the
device.
The zeroize keyword deletes the DSA host key pair from the flash memory and disables SSH on the
device.
Summary of Contents for BigIron RX Series
Page 228: ...152 BigIron RX Series Configuration Guide 53 1002253 01 Enabling WAN PHY mode support 6 ...
Page 312: ...236 BigIron RX Series Configuration Guide 53 1002253 01 Displaying IP information 7 ...
Page 356: ...280 BigIron RX Series Configuration Guide 53 1002253 01 Resetting LLDP statistics 9 ...
Page 402: ...326 BigIron RX Series Configuration Guide 53 1002253 01 Transparent firewall mode 11 ...
Page 432: ...356 BigIron RX Series Configuration Guide 53 1002253 01 SuperSpan 12 ...
Page 500: ...424 BigIron RX Series Configuration Guide 53 1002253 01 MRP CLI example 14 ...
Page 591: ...BigIron RX Series Configuration Guide 515 53 1002253 01 Displaying traffic reduction 19 ...
Page 592: ...516 BigIron RX Series Configuration Guide 53 1002253 01 Displaying traffic reduction 19 ...
Page 598: ...522 BigIron RX Series Configuration Guide 53 1002253 01 Viewing Layer 2 ACLs 20 ...
Page 656: ...580 BigIron RX Series Configuration Guide 53 1002253 01 Trunk formation 22 ...
Page 754: ...678 BigIron RX Series Configuration Guide 53 1002253 01 Displaying RIP filters 24 ...
Page 814: ...738 BigIron RX Series Configuration Guide 53 1002253 01 Displaying OSPF information 25 ...
Page 980: ...904 BigIron RX Series Configuration Guide 53 1002253 01 Clearing IS IS information 28 ...
Page 1000: ...924 BigIron RX Series Configuration Guide 53 1002253 01 Using secure copy 30 ...
Page 1088: ...1012 BigIron RX Series Configuration Guide 53 1002253 01 IP source guard 35 ...
Page 1108: ...1032 BigIron RX Series Configuration Guide 53 1002253 01 Reading CDP packets 37 ...
Page 1126: ...1050 BigIron RX Series Configuration Guide 53 1002253 01 Clearing sFlow statistics 39 ...
Page 1324: ...1248 BigIron RX Series Configuration Guide 53 1002253 01 Displaying OSPFv3 information 48 ...
Page 1363: ...BigIron RX Series Configuration Guide 1287 53 1002253 01 Continuous System Monitor 51 ...
Page 1364: ...1288 BigIron RX Series Configuration Guide 53 1002253 01 Continuous System Monitor 51 ...
Page 1404: ...1328 BigIron RX Series Configuration Guide 53 1002253 01 Commands That Require a Reload D ...
Page 1458: ...1382 BigIron RX Series Configuration Guide 53 1002253 01 VSRP E ...