Foundry Switch and Router Installation and Configuration Guide
vi December 2000
ENABLING RSA CHALLENGE-RESPONSE AUTHENTICATION ....................................................................4-5
S
ETTING OPTIONAL PARAMETERS ...............................................................................................................4-5
S
ETTING THE NUMBER OF SSH AUTHENTICATION RETRIES ...................................................................4-5
S
ETTING THE SERVER RSA KEY SIZE ...................................................................................................4-5
D
EACTIVATING USER AUTHENTICATION .................................................................................................4-6
ENABLING EMPTY PASSWORD LOGINS ..................................................................................................4-6
S
ETTING THE SSH PORT NUMBER ........................................................................................................4-6
S
ETTING THE SSH LOGIN TIMEOUT VALUE ...........................................................................................4-6
DESIGNATING AN INTERFACE AS THE SOURCE FOR ALL SSH PACKETS ..................................................4-7
V
IEWING SSH CONNECTION INFORMATION ..................................................................................................4-7
S
AMPLE SSH CONFIGURATION ...................................................................................................................4-9
USING SECURE COPY .................................................................................................................................4-9
CHAPTER 5
U
SING REDUNDANT MANAGEMENT MODULES .............................................. 5-1
CONFIGURATION CONSIDERATIONS ..............................................................................................................5-2
T
EMPERATURE SENSOR ..............................................................................................................................5-2
S
WITCHOVER ..............................................................................................................................................5-2
M
ANAGEMENT SESSIONS ......................................................................................................................5-2
S
YSLOG AND SNMP TRAPS .................................................................................................................5-3
MAC A
DDRESS CHANGES ....................................................................................................................5-3
C
ONFIGURING THE REDUNDANT MANAGEMENT PARAMETERS .......................................................................5-3
I
NSTALLING REDUNDANT MANAGEMENT MODULES ................................................................................5-3
D
ETERMINING REDUNDANT MANAGEMENT MODULE STATUS ..................................................................5-8
D
ISPLAYING SWITCHOVER MESSAGES .................................................................................................5-10
F
ILE SYNCHRONIZATION BETWEEN THE ACTIVE AND STANDBY REDUNDANT MANAGEMENT MODULES ..........5-11
D
ISPLAYING THE SYNCHRONIZATION SETTINGS ...................................................................................5-12
I
MMEDIATELY SYNCHRONIZING SOFTWARE ..........................................................................................5-13
A
UTOMATING SYNCHRONIZATION OF SOFTWARE .................................................................................5-14
S
WITCHING OVER TO THE STANDBY REDUNDANT MANAGEMENT MODULE ..................................................5-16
PCMCIA F
LASH CARD FILE MANAGEMENT COMMANDS .............................................................................5-17
PCMCIA S
LOTS ................................................................................................................................5-18
S
UBDIRECTORIES ...............................................................................................................................5-18
F
ILE AND SUBDIRECTORY NAMING CONVENTIONS ................................................................................5-19
W
ILDCARDS .......................................................................................................................................5-19
F
ORMATTING A FLASH CARD ..............................................................................................................5-20
D
ETERMINING THE FLASH CARD SLOT AND SUBDIRECTORY PATH THAT CURRENTLY HAVE THE MANAGEMENT
F
OCUS ........................................................................................................................................5-20
S
WITCHING THE MANAGEMENT FOCUS ................................................................................................5-21
D
ISPLAYING A DIRECTORY OF THE FILES ON A FLASH CARD ................................................................5-21
D
ISPLAYING THE CONTENTS OF A FILE ................................................................................................5-23
D
ISPLAY A HEXADECIMAL DUMP OF THE DATA IN A FILE ......................................................................5-23
C
REATING A SUBDIRECTORY ..............................................................................................................5-24
R
EMOVING A SUBDIRECTORY ..............................................................................................................5-25
R
ENAMING A FILE ...............................................................................................................................5-25