Using RSA Authentication of SSH
The following procedure authenticates an SSH client based on an RSA key using RSA authentication. This
method uses SSH version 2.
1.
On the SSH client (Unix machine), generate an RSA key, as shown in the following example.
2.
Copy the public key
id_rsa.pub
to the Dell Networking system.
3.
Disable password authentication if enabled.
CONFIGURATION mode
no ip ssh password-authentication enable
4.
Bind the public keys to RSA authentication.
EXEC Privilege mode
ip ssh rsa-authentication enable
5.
Bind the public keys to RSA authentication.
EXEC Privilege mode
ip ssh rsa-authentication my-authorized-keys flash:
//public_key
Example of Generating RSA Keys
admin@Unix_client#ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/admin/.ssh/id_rsa):
/home/admin/.ssh/id_rsa already exists.
Overwrite (y/n)? y
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/admin/.ssh/id_rsa.
Your public key has been saved in /home/admin/.ssh/id_rsa.pub.
Configuring Host-Based SSH Authentication
Authenticate a particular host. This method uses SSH version 2.
To configure host-based authentication, use the following commands.
1.
Configure RSA Authentication. Refer to
Using RSA Authentication of SSH
.
2.
Create
shosts
by copying the public RSA key to the file
shosts
in the directory
.ssh
, and write the IP
address of the host to the file.
cp /etc/ssh/ssh_host_rsa_key.pub /.ssh/shosts
Refer to the first example.
3.
Create a list of IP addresses and usernames that are permitted to SSH in a file called
rhosts
.
Refer to the second example.
4.
Copy the file
shosts
and
rhosts
to the Dell Networking system.
5.
Disable password authentication and RSA authentication, if configured
CONFIGURATION mode or EXEC Privilege mode
no ip ssh password-authentication
or
no ip ssh rsa-authentication
6.
Enable host-based authentication.
Security
737
Содержание Z9000
Страница 1: ...Dell Configuration Guide for the Z9000 System 9 7 0 0 ...
Страница 80: ...grub reboot 80 Management ...
Страница 128: ... 0 Te 1 1 Te 1 2 rx Flow N A N A 128 Access Control Lists ACLs ...
Страница 436: ...Figure 50 Inspecting Configuration of LAG 10 on ALPHA 436 Link Aggregation Control Protocol LACP ...
Страница 439: ...Figure 52 Inspecting a LAG Port on BRAVO Using the show interface Command Link Aggregation Control Protocol LACP 439 ...
Страница 440: ...Figure 53 Inspecting LAG 10 Using the show interfaces port channel Command 440 Link Aggregation Control Protocol LACP ...
Страница 491: ...Figure 70 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 491 ...
Страница 492: ...Figure 71 Configuring PIM in Multiple Routing Domains 492 Multicast Source Discovery Protocol MSDP ...
Страница 496: ...Figure 73 MSDP Default Peer Scenario 1 496 Multicast Source Discovery Protocol MSDP ...
Страница 497: ...Figure 74 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 497 ...
Страница 498: ...Figure 75 MSDP Default Peer Scenario 3 498 Multicast Source Discovery Protocol MSDP ...
Страница 760: ...Figure 100 Single and Double Tag TPID Match 760 Service Provider Bridging ...
Страница 761: ...Figure 101 Single and Double Tag First byte TPID Match Service Provider Bridging 761 ...