
Configuring Secure Shell
December 2000
4 - 9
Sample SSH Configuration
The following is a sample SSH configuration for a Foundry device.
hostname BigIron
ip dns domain-name foundrynet.com
!
aaa authentication login default local
username neville password .....
username lynval password .....
username terry password .....
!
ip ssh permit-empty-passwd no
!
ip ssh pub-key-file tftp 192.168.1.234 pkeys.txt
!
crypto key generate rsa public_key "1024 35 144460146631716543532035011163035196
41193195125205894452637462409522275505020845087302985209960346239172995676329357
24777530188666267898195648253181551624681394520681672610828188310413962242301296
26883937176769776184984093100984017075369387071006637966650877224677979486802651
458324218055083313313948534902409 [email protected]"
!
crypto key generate rsa private_key "*************************"
!
ip ssh authentication-retries 5
This
aaa authentication login default local
command configures the device to use the local user accounts to
authenticate users attempting to log in.
Three user accounts are configured on the device. The
ip ssh permit-empty-passwd no
command causes
users always to be prompted for a password when they attempt to establish an SSH connection. Since the device
uses local user accounts for authentication, only these three users are allowed to connect to the device using
SSH.
The
ip ssh pub-key-file tftp
command causes a public key file called pkeys.txt to be loaded from a TFTP server
at 192.168.1.234. To gain access to the Foundry device using SSH, a user must have a private key that
corresponds to one of the public keys in this file.
The
crypto key generate rsa public_key
and
crypto key generate rsa private_key
statements are both
generated by the
crypto key generate rsa
command. The public key is visible; the private key is not. You may
need to copy the public key to a “known hosts” file (for example, $HOME/.ssh/known_hosts on UNIX systems) on
the clients who want to access the device. See “Providing the Public Key to Clients” on page 4-2 for an example
of what to place in the known hosts file.
The
ip ssh authentication-retries 5
command sets the number of times the Foundry device attempts to
negotiate a connection with the connecting host to 5.
Using Secure Copy
Secure Copy (SCP) uses security built into SSH to transfer files between hosts on a network, providing a more
secure file transfer method than Remote Copy (RCP) or FTP. SCP automatically uses the authentication
methods, encryption algorithm, and data compression level configured for SSH. For example, if password
authentication is enabled for SSH, the user is prompted for a user name and password before SCP allows a file to
be transferred. No additional configuration is required for SCP on top of SSH.
You can use SCP to copy files on the Foundry device, including the startup-config and running-config files, to or
from an SCP-enabled remote host.
SCP is enabled by default and can be disabled. To disable SCP, enter the following command:
BigIron(config)# ip ssh scp disable
Syntax:
ip ssh scp disable | enable
Summary of Contents for Switch and Router
Page 2: ...December 2000 Copyright 2000 by Foundry Networks Inc ...
Page 26: ...Foundry Switch and Router Installation and Configuration Guide xxvi December 2000 ...
Page 64: ...Foundry Switch and Router Installation and Configuration Guide 2 34 December 2000 ...
Page 162: ...Foundry Switch and Router Installation and Configuration Guide 5 38 December 2000 ...
Page 196: ...Foundry Switch and Router Installation and Configuration Guide 6 34 December 2000 ...
Page 208: ...Foundry Switch and Router Installation and Configuration Guide 7 12 December 2000 ...
Page 236: ...Foundry Switch and Router Installation and Configuration Guide 8 28 December 2000 ...
Page 258: ...Foundry Switch and Router Installation and Configuration Guide 9 22 December 2000 ...
Page 420: ...Foundry Switch and Router Installation and Configuration Guide 13 32 December 2000 ...
Page 442: ...Foundry Switch and Router Installation and Configuration Guide 14 22 December 2000 ...
Page 554: ...Foundry Switch and Router Installation and Configuration Guide 15 112 December 2000 ...
Page 574: ...Foundry Switch and Router Installation and Configuration Guide 16 20 December 2000 ...
Page 626: ...Foundry Switch and Router Installation and Configuration Guide 17 52 December 2000 ...
Page 682: ...Foundry Switch and Router Installation and Configuration Guide 18 56 December 2000 ...
Page 826: ...Foundry Switch and Router Installation and Configuration Guide 20 20 December 2000 ...
Page 994: ...Foundry Switch and Router Installation and Configuration Guide 26 10 December 2000 ...
Page 1004: ...Foundry Switch and Router Installation and Configuration Guide B 6 December 2000 ...
Page 1044: ...Foundry Switch and Router Installation and Configuration Guide C 40 December 2000 ...
Page 1048: ...Foundry Switch and Router Installation and Configuration Guide D 4 December 2000 ...
Page 1070: ...Foundry Switch and Router Installation and Configuration Guide Index 18 December 2000 ...