Setting optional parameters, Deactivating user authentication – Brocade Multi-Service IronWare Security Configuration Guide (Supporting R05.6.00) User Manual
Page 267
![background image](/manuals/361632/267/background.png)
Multi-Service IronWare Security Configuration Guide
249
53-1003035-02
SSH server version 2 support
5
Setting optional parameters
You can adjust the following SSH server settings on the device:
•
Number of SSH server authentication retries
•
User authentication method the device uses for SSH server connections
•
Whether or not the device allows users to log in without supplying a password
•
Port number for SSH server connections
•
SSH server login timeout value
•
A specific interface to be used as the source for all SSH server traffic from the device
•
Maximum idle time for SSH server sessions
•
Disable 3-DES support
Setting the number of SSH server authentication retries
By default, the device attempts to negotiate a connection with the connecting host three times. The
number of authentication retries can be changed to between 1 – 5.
For example, the following command changes the number of authentication retries to 5.
Brocade(config)# ip ssh authentication-retries 5
Syntax: ip ssh authentication-retries number
Deactivating user authentication
After the SSH server on the device negotiates a session key and encryption method with the
connecting client, user authentication takes place. The implementation of SSH server supports
DSA challenge-response authentication and password authentication.
With DSA challenge-response authentication, a collection of clients’ public keys are stored on the
device. Clients are authenticated using these stored public keys. Only clients that have a private
key that corresponds to one of the stored public keys can gain access to the device using SSH
server.
With password authentication, users are prompted for a password when they attempt to log into the
device (provided empty password logins are not allowed; refer to
). If there is no user account that matches the user name and password supplied by the
user, the user is not granted access.
You can deactivate one or both user authentication methods for SSH server. Note that deactivating
both authentication methods essentially disables the SSH server entirely.
To disable DSA challenge-response authentication.
Brocade(config)# ip ssh key-authentication no
Syntax: ip ssh key-authentication yes | no
The default is “yes”.
To deactivate password authentication.
Brocade(config)# ip ssh password-authentication no
Syntax: ip ssh password-authentication no | yes