Dell FCX624-S Laptop User Manual


  Open as PDF
of 1494
 
PowerConnect B-Series FCX Configuration Guide xxxi
53-1002266-01
TCP Flags - edge port security . . . . . . . . . . . . . . . . . . . . . . . . . . . 1201
Using TCP Flags in combination with other ACL features . . 1202
Chapter 33 Configuring SSH2 and SCP
SSH version 2 support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1203
Tested SSH2 clients. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1204
Supported features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1204
Unsupported features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1204
AES encryption for SSH2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1205
Configuring SSH2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1205
Recreating SSH keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1206
Generating a host key pair . . . . . . . . . . . . . . . . . . . . . . . . . . 1206
Configuring DSA challenge-response authentication . . . . . 1207
Setting optional parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1209
Setting the number of SSH authentication retries . . . . . . . .1210
Deactivating user authentication . . . . . . . . . . . . . . . . . . . . . .1210
Enabling empty password logins. . . . . . . . . . . . . . . . . . . . . . .1210
Setting the SSH port number . . . . . . . . . . . . . . . . . . . . . . . . 1211
Setting the SSH login timeout value. . . . . . . . . . . . . . . . . . . 1211
Designating an interface as the source for all SSH packets 1211
Configuring the maximum idle time for SSH sessions . . . . 1211
Filtering SSH access using ACLs . . . . . . . . . . . . . . . . . . . . . . . . . 1212
Terminating an active SSH connection . . . . . . . . . . . . . . . . . . . . 1212
Displaying SSH connection information . . . . . . . . . . . . . . . . . . . 1212
Using Secure copy with SSH2 . . . . . . . . . . . . . . . . . . . . . . . . . . . 1213
Enabling and disabling SCP . . . . . . . . . . . . . . . . . . . . . . . . . 1213
Configuration notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1214
Example file transfers using SCP . . . . . . . . . . . . . . . . . . . . . .1214
Chapter 34 Configuring 802.1X Port Security
IETF RFC support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1217
How 802.1X port security works . . . . . . . . . . . . . . . . . . . . . . . . . 1218
Device roles in an 802.1X configuration . . . . . . . . . . . . . . . 1218
Communication between the devices . . . . . . . . . . . . . . . . . 1219
Controlled and uncontrolled ports . . . . . . . . . . . . . . . . . . . . 1219
Message exchange during authentication. . . . . . . . . . . . . . 1220
Authenticating multiple hosts connected to the same port 1223
802.1X port security and sFlow . . . . . . . . . . . . . . . . . . . . . . 1226
802.1X accounting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1226