•
ip ssh hostbased-authentication enable
: enable host-based authentication for the SSHv2 server.
•
ip ssh password-authentication enable
: enable password authentication for the SSH server.
•
ip ssh pub-key-file
: specify the file the host-based authentication uses.
•
ip ssh rhostsfile
: specify the rhost file the host-based authorization uses.
•
ip ssh rsa-authentication enable
: enable RSA authentication for the SSHv2 server.
•
ip ssh rsa-authentication
: add keys for the RSA authentication.
•
show crypto
: display the public part of the SSH host-keys.
•
show ip ssh client-pub-keys
: display the client public keys used in host-based authentication.
•
show ip ssh rsa-authentication
: display the authorized-keys for the RSA authentication.
Dell#copy scp: flash:
Address or name of remote host []: 10.10.10.1
Port number of the server [22]: 99
Source file name []: test.cfg
User name to login remote host: admin
Password to login remote host:
Removing the RSA Host Keys and Zeroizing Storage
Use the
crypto key zeroize rsa
command to delete the host key pairs, both the public and private key information for RSA 1 and
or RSA 2 types. Note that when FIPS mode is enabled there is no RSA 1 key pair. Any memory currently holding these keys is zeroized
(written over with zeroes) and the NVRAM location where the keys are stored for persistence across reboots is also zeroized.
To remove the generated RSA host keys and zeroize the key storage location, use the
crypto key zeroize rsa
command in
CONFIGURATION mode.
Dell(conf)#crypto key zeroize rsa
Configuring When to Re-generate an SSH Key
You can configure the time-based or volume-based rekey threshold for an SSH session. If both threshold types are configured, the session
rekeys when either one of the thresholds is reached.
To configure the time or volume rekey threshold at which to re-generate the SSH key during an SSH session, use the
ip ssh rekey
[
time
rekey-interval
] [
volume
rekey-limit
] command. CONFIGURATION mode.
Configure the following parameters:
•
rekey-interval:
time-based rekey threshold for an SSH session. The range is from 10 to 1440 minutes. The default is
60
minutes.
•
rekey-limit
: volume-based rekey threshold for an SSH session. The range is from 1 to 4096 to megabytes. The default is
1024
megabytes.
Examples
The following example configures the time-based rekey threshold for an SSH session to 30 minutes.
Dell(conf)#ip ssh rekey time 30
The following example configures the volume-based rekey threshold for an SSH session to 4096 megabytes.
Dell(conf)#ip ssh rekey volume 4096
Security
717
Summary of Contents for S3048-ON
Page 1: ...Dell Configuration Guide for the S3048 ON System 9 11 2 5 ...
Page 137: ...0 Gi 1 1 Gi 1 2 rx Flow N A N A 0 0 No N A N A yes Access Control Lists ACLs 137 ...
Page 142: ...Figure 10 BFD Three Way Handshake State Changes 142 Bidirectional Forwarding Detection BFD ...
Page 241: ...Dell Control Plane Policing CoPP 241 ...
Page 287: ... RPM Synchronization GARP VLAN Registration Protocol GVRP 287 ...
Page 428: ...Figure 53 Inspecting the LAG Configuration 428 Link Aggregation Control Protocol LACP ...
Page 477: ...Figure 73 Configuring Interfaces for MSDP Multicast Source Discovery Protocol MSDP 477 ...
Page 478: ...Figure 74 Configuring OSPF and BGP for MSDP 478 Multicast Source Discovery Protocol MSDP ...
Page 483: ...Figure 77 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 483 ...
Page 484: ...Figure 78 MSDP Default Peer Scenario 3 484 Multicast Source Discovery Protocol MSDP ...
Page 745: ...Figure 104 Single and Double Tag TPID Match Service Provider Bridging 745 ...
Page 746: ...Figure 105 Single and Double Tag First byte TPID Match 746 Service Provider Bridging ...