Quick Reference Guide

PowerConnect B-Series TI24X Configuration Guide xxv
53-1002269-02
Configuring RADIUS security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .892
RADIUS authentication, authorization, and accounting . . . . .893
RADIUS configuration considerations. . . . . . . . . . . . . . . . . . . .896
RADIUS configuration procedure . . . . . . . . . . . . . . . . . . . . . . .896
Configuring Dell-specific attributes on the RADIUS server . . .896
Enabling SNMP to configure RADIUS . . . . . . . . . . . . . . . . . . . .897
Identifying the RADIUS server to the device. . . . . . . . . . . . . . .898
Specifying different servers for individual AAA functions . . . .898
Configuring a RADIUS server per port . . . . . . . . . . . . . . . . . . .898
Mapping a RADIUS server to individual ports . . . . . . . . . . . . .899
Setting RADIUS parameters . . . . . . . . . . . . . . . . . . . . . . . . . . .900
Configuring authentication-method lists for RADIUS. . . . . . . .901
Configuring RADIUS authorization . . . . . . . . . . . . . . . . . . . . . .903
Configuring RADIUS accounting . . . . . . . . . . . . . . . . . . . . . . . .905
Configuring an interface as the source for all
RADIUS packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .906
Displaying RADIUS configuration information . . . . . . . . . . . . .906
Configuring authentication-method lists . . . . . . . . . . . . . . . . . . . . .907
Configuration considerations for authentication- method lists908
Examples of authentication-method lists. . . . . . . . . . . . . . . . .909
Chapter 27 Configuring SSH2 and SCP
SSH version 2 support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .911
Tested SSH2 clients. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .911
Supported features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .912
Unsupported features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .912
AES encryption for SSH2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .912
Configuring SSH2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .913
Recreating SSH keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .914
Generating a host key pair . . . . . . . . . . . . . . . . . . . . . . . . . . . .914
Configuring DSA challenge-response authentication . . . . . . .915
Setting optional parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .917
Setting the number of SSH authentication retries . . . . . . . . .918
Deactivating user authentication . . . . . . . . . . . . . . . . . . . . . . .918
Enabling empty password logins. . . . . . . . . . . . . . . . . . . . . . . .918
Setting the SSH port number . . . . . . . . . . . . . . . . . . . . . . . . . .919
Setting the SSH login timeout value. . . . . . . . . . . . . . . . . . . . .919
Designating an interface as the source for all SSH
packets (Layer 3 code only). . . . . . . . . . . . . . . . . . . . . . . . . . . .919
Configuring the maximum idle time for SSH sessions . . . . . .920
Filtering SSH access using ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . .920
Terminating an active SSH connection . . . . . . . . . . . . . . . . . . . . . .920
Displaying SSH connection information . . . . . . . . . . . . . . . . . . . . .920
Using Secure copy with SSH2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . .922
Enabling and disabling SCP . . . . . . . . . . . . . . . . . . . . . . . . . . .922
Example file transfers using SCP . . . . . . . . . . . . . . . . . . . . . . .922