Dell Force10 S25-01-GE-24V S-Series Secure Management - Page 3

SFTOS Version <= 2.2.1, the following messages.

Page 3 highlights

S-Series Secure Management SFTOS #copy tftp://192.168.0.10/rsa2.key nvram:sshkey-rsa2 Mode TFTP Set TFTP Server IP 192.168.0.10 TFTP Path TFTP Filename rsa2.key Data Type SSH RSA2 key Management access will be blocked for the duration of the transfer Are you sure you want to start? (y/n) y TFTP SSH key receive complete... updating key file... Key file transfer operation completed successfully SFTOS #copy tftp://192.168.0.10/dsa.key nvram:sshkey-dsa Mode TFTP Set TFTP Server IP 192.168.0.10 TFTP Path TFTP Filename dsa.key Data Type SSH DSA key Management access will be blocked for the duration of the transfer Are you sure you want to start? (y/n) y TFTP SSH key receive complete... updating key file... Key file transfer operation completed successfully 3. Enable the SSH server with this command. SFTOS Version = 2.3.1 (SFTOS) #ip ssh server enable SFTOS (Config)#ip ssh server enable To verify that the server has started, use this command to show the SSH server status and check the log file for the following messages. SFTOS #show ip ssh SSH Configuration Administrative Mode Enabled Protocol Levels Versions 1 and 2 SSH Sessions Currently Active 0 Max SSH Sessions Allowed 5 SSH Timeout 5 SFTOS #show logging buffered JAN 01 00:31:54 192.168.0.34-1 UNKN[222273672]: sshd_control.c(444) 15 %% SSHD: sshdListenTask started JAN 01 00:31:54 192.168.0.34-1 UNKN[209305936]: sshd_main.c(596) 16 %% SSHD: successfully opened file ssh_host_dsa_key JAN 01 00:31:54 192.168.0.34-1 UNKN[209305936]: sshd_main.c(609) 17 %% SSHD: successfully loaded DSA key JAN 01 00:31:54 192.168.0.34-1 UNKN[209305936]: sshd_main.c(631) 18 %% SSHD: successfully opened file ssh_host_rsa_key JAN 01 00:31:54 192.168.0.34-1 UNKN[209305936]: sshd_main.c(643) 19 %% SSHD: successfully loaded RSA2 key JAN 01 00:31:56 192.168.0.34-1 UNKN[209305936]: sshd_main.c(353) 20 %% SSHD: Done generating server key - 3 -

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6

S-Series Secure Management
SFTOS #
copy tftp://192.168.0.10/rsa2.key nvram:sshkey-rsa2
Mode
...........................................
TFTP
Set TFTP Server IP
.............................
192.168.0.10
TFTP Path
......................................
TFTP Filename
..................................
rsa2.key
Data Type
......................................
SSH RSA2 key
Management access will be blocked for the duration of the transfer
Are you sure you want to start? (y/n)
y
TFTP SSH key receive complete... updating key file...
Key file transfer operation completed successfully
SFTOS #
copy tftp://192.168.0.10/dsa.key nvram:sshkey-dsa
Mode
...........................................
TFTP
Set TFTP Server IP
.............................
192.168.0.10
TFTP Path
......................................
TFTP Filename
..................................
dsa.key
Data Type
......................................
SSH DSA key
Management access will be blocked for the duration of the transfer
Are you sure you want to start? (y/n)
y
TFTP SSH key receive complete... updating key file...
Key file transfer operation completed successfully
3. Enable the SSH server with this command.
SFTOS Version <= 2.2.1
SFTOS Version >= 2.3.1
(SFTOS) #
ip ssh server enable
SFTOS (Config)#
ip ssh server enable
To verify that the server has started, use this command to show the SSH server status and check the log file for
the following messages.
SFTOS #
show ip ssh
SSH Configuration
Administrative Mode:
..........................
Enabled
Protocol Levels:
..............................
Versions 1 and 2
SSH Sessions Currently Active:
................
0
Max SSH Sessions Allowed:
.....................
5
SSH Timeout:
..................................
5
SFTOS #
show logging buffered
JAN 01 00:31:54 192.168.0.34-1 UNKN[222273672]: sshd_control.c(444) 15 %% SSHD: sshdListenTask
started
JAN 01 00:31:54 192.168.0.34-1 UNKN[209305936]: sshd_main.c(596) 16 %% SSHD: successfully
opened file ssh_host_dsa_key
JAN 01 00:31:54 192.168.0.34-1 UNKN[209305936]: sshd_main.c(609) 17 %% SSHD: successfully
loaded DSA key
JAN 01 00:31:54 192.168.0.34-1 UNKN[209305936]: sshd_main.c(631) 18 %% SSHD: successfully
opened file ssh_host_rsa_key
JAN 01 00:31:54 192.168.0.34-1 UNKN[209305936]: sshd_main.c(643) 19 %% SSHD: successfully
loaded RSA2 key
JAN 01 00:31:56 192.168.0.34-1 UNKN[209305936]: sshd_main.c(353) 20 %% SSHD: Done generating
server key
- 3 -