1. Manuals
  2. Brands
  3. Computer Equipment
  4. Switch
  5. IBM
  6. Computer Equipment
  7. Switch

IBM 12.1(22)EA6 Configuring SSH

1 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 550
Download on canonical page 550 pages, 5.74 Mb
5-33
Cisco Systems IntelligentGigabit Ethernet Switch Modules for the IBM BladeCenter, Software Configuration Guide
24R9746
Chapter5 Configuring Switch-Ba sed Authentication
Configuring the Switch for Secure Shell
SSH also supports these user authentication methods:
TACACS+ (for more information, see the “Controlling Switch Access with TACACS+” section on
page 5-9)
RADIUS (for more information, see the “Controlling Switch Access with RADIUS” section on
page 5-16)
Local authentication and authorization (for more information, see the “Configuring the Switch for
Local Authentication and Authorization” section on page 5- 31)
Note This software release does not suppor t IP Security (IPSec).

Limitations

These limitations apply to SSH:
The switch supports Rivest, Shamir, and Adelman (RSA) authentication.
SSH supports only the execution-shell application.
The SSH server and the SSH client are supported only on DES (56-bit) and 3DES (168-bit) data
encryption software.
The switch does not support the Advanced Encryption Standard (AES) symmetric encryption
algorithm.
Configuring SSH
This section has this configuration information:
Configuration Guidelines, page 5-33
Cryptographic Software Image Guidelines, page 5-34
Configuring the SSH Server, page 5-35 (required only if you are configuring the switch as an SSH
server)
Before configuring SSH, download the cryptographic software image from www.ibm.com/support, as
described in the “Setting Up the Switch to Run SSH” section on page 5-34. For information about
configuring SSH and displaying SSH settings, see the “Configuring Secure Shell” section in the Cisco
IOS Security Configuration Guide for Cisco IOS Release 12.2.

Configuration Guidelines

Follow these guidelines when configuring the switch as an SSH server or SSH client:
An RSA key pair generated by a SSHv1 server can be used by an SSHv2 server, and the reverse.
If you get CLI error messages after entering the crypto key generate rsa global configuration
command, an RSA key pair has not been generated. Reconfigure the host na me and domain, and then
enter the crypto key generate rsa command. For more information, see the “Setting Up the Switch
to Run SSH” section on page 5-34.
When generating the RSA key pair, the message “No host name specified” might appear. If it does,
you must configure a host name by using the hostname global configuration command.
MENU

Models

Contents