ssh
- service ssh
- SDE
M10-Smart
M2
RS420
Secure SHell (SSH) protocol
- service ssh aaa
- SDE
M10-Smart
M2
RS420
AAA options
- service ssh aaa accounting <id>
- SDE
M10-Smart
M2
RS420
Accounting list name
- Reference
- service ssh aaa authentication <id>
- SDE
M10-Smart
M2
RS420
Authentication list name
- Reference
- service ssh access-control
- SDE
M10-Smart
M2
RS420
Limit how roles and users can access the system through SSH
- service ssh access-control allow
- SDE
M10-Smart
M2
RS420
Allow access to specific roles/users
- service ssh access-control allow role <id>
- SDE
M10-Smart
M2
RS420
- Values
id – Role
- Instances
Multiple
- service ssh access-control allow user <txt>
- SDE
M10-Smart
M2
RS420
User
- Reference
- Instances
Multiple
- service ssh access-control deny
- SDE
M10-Smart
M2
RS420
Deny access to specific roles/users
- service ssh access-control deny role <id>
- SDE
M10-Smart
M2
RS420
- Values
id – Role
- Instances
Multiple
- service ssh access-control deny user <txt>
- SDE
M10-Smart
M2
RS420
User
- Reference
- Instances
Multiple
- service ssh agent-forwarding
- SDE
M10-Smart
M2
RS420
Enables SSH agent forwarding
- service ssh cipher <id>
- SDE
M10-Smart
M2
RS420
- Values
id – Ciphers to use for ongoing SSH connections It is possible to limit which ciphers will be used for ongoing SSH connections. A list of ciphers is accepted, and they will be sorted by their strength (strong-first based ordering).
- Instances
List of values
- service ssh disable-forwarding
- SDE
M10-Smart
M2
RS420
Disables all SSH forwarding features (X11, agent, TCP and stream local)
This option overrides all other forwarding-related options, which may simplify restricted configurations
- service ssh disable-password-authentication
- SDE
M10-Smart
M2
RS420
Disables the login using password authentication
- service ssh disable-pubkey-authentication
- SDE
M10-Smart
M2
RS420
Disables the login using public key authentication
- service ssh disable-tty
- SDE
M10-Smart
M2
RS420
Specifies whether pty allocation is permitted
- service ssh host-key <file>
- SDE
M10-Smart
M2
RS420
- Values
file – Host key used when others connect to us through SSH
- Instances
Multiple
- service ssh keepalive-count-max <u32>
- SDE
M10-Smart
M2
RS420
Number of keepalive messages to be sent without any response from the client
- Values
u32 – Disables connection termination (0)
u32 – Number of messages to be sent (1-65535)
- service ssh keepalive-interval <u32>
- SDE
M10-Smart
M2
RS420
Timeout interval in seconds after which SSH will send a message requesting a response
- Values
u32 – Seconds (0-65535)
- service ssh key-exchange <id>
- SDE
M10-Smart
M2
RS420
- Values
id – Specifies the available KEX (Key Exchange) algorithms
- Instances
List of values
- service ssh listen-address <ipv4|ipv6|id>
- SDE
M10-Smart
M2
RS420
Listen address to listen to
- Values
ipv4 – IP address to listen to
ipv6 – IPv6 address to listen to
hostname – Hostname to listen to
- Local IP address
- Instances
Multiple
- service ssh log-level <txt>
- SDE
M10-Smart
M2
RS420
Specific log-level to use. Each level logs their own messages and “higher” levels ones
- Values
quiet – Log no messages
fatal – Fatal messages
error – Error messages
info – Informational messages
verbose – More informational messages
debug – Debugging messages
debug2 – More debugging messages
debug3 – Even more debugging messages
- service ssh mac <id>
- SDE
M10-Smart
M2
RS420
- Values
id – Specifies the available MAC (Message Authentication Code) algorithms The MAC algorithm is used for data integrity protection. The algorithms that contain “-etm” calculate the MAC after encryption (encrypt-then-mac). These are considered safer and their use recommended.
- Instances
List of values
- service ssh match
- SDE
M10-Smart
M2
RS420
Match directives to apply a given configuration to specific users or groups
- service ssh match address <ipv4cidr|ipv6cidr>
- SDE
M10-Smart
M2
RS420
- Values
ipv4cidr – Specific configuration for matched addresses
ipv6cidr – Specific configuration for matched addresses
- Instances
Multiple
- service ssh match address <ipv4cidr|ipv6cidr> agent-forwarding
- SDE
M10-Smart
M2
RS420
Enables SSH agent forwarding
- service ssh match address <ipv4cidr|ipv6cidr> disable-password-authentication
- SDE
M10-Smart
M2
RS420
Disables the login using password authentication
- service ssh match address <ipv4cidr|ipv6cidr> disable-pubkey-authentication
- SDE
M10-Smart
M2
RS420
Disables the login using public key authentication
- service ssh match address <ipv4cidr|ipv6cidr> disable-tty
- SDE
M10-Smart
M2
RS420
Specifies whether pty allocation is permitted
- service ssh match address <ipv4cidr|ipv6cidr> keepalive-count-max <u32>
- SDE
M10-Smart
M2
RS420
Number of keepalive messages to be sent without any response from the client
- Values
u32 – Disables connection termination (0)
u32 – Number of messages to be sent (1-65535)
- service ssh match address <ipv4cidr|ipv6cidr> keepalive-interval <u32>
- SDE
M10-Smart
M2
RS420
Timeout interval in seconds after which SSH will send a message requesting a response
- Values
u32 – Seconds (0-65535)
- service ssh match address <ipv4cidr|ipv6cidr> log-level <txt>
- SDE
M10-Smart
M2
RS420
Specific log-level to use. Each level logs their own messages and “higher” levels ones
- Values
quiet – Log no messages
fatal – Fatal messages
error – Error messages
info – Informational messages
verbose – More informational messages
debug – Debugging messages
debug2 – More debugging messages
debug3 – Even more debugging messages
- service ssh match address <ipv4cidr|ipv6cidr> max-sessions <u32>
- SDE
M10-Smart
M2
RS420
Maximum number of open shell, login or subsystem sessions allowed per connection
- Values
u32 – No shell, login and subsystem sessions are allowed (but forwarding allowed) (0)
u32 – Disable session multiplexing (1)
u32 – Maximum number of sessions allowed (2-65535)
- service ssh match address <ipv4cidr|ipv6cidr> permit-empty-passwords
- SDE
M10-Smart
M2
RS420
Whether the server allows login to accounts with empty password strings
This feature only takes place when password authentication is enabled.
- service ssh match address <ipv4cidr|ipv6cidr> permit-open <fqdn|ipv4|ipv6>
- SDE
M10-Smart
M2
RS420
Specifies destinations to which TCP port forwarding is permitted
- Values
fqdn – Host to allow forwarding TCP connections to
ipv4 – IPv4 address to allow forwarding TCP connections to
ipv6 – IPv6 address to allow forwarding TCP connections to
- Instances
Multiple
- Required
- service ssh match address <ipv4cidr|ipv6cidr> permit-open <fqdn|ipv4|ipv6> port <u32>
- SDE
M10-Smart
M2
RS420
Port to allow forwarding TCP connections to
- Values
u32 – Port to allow forwarding connection to (1-65535)
- Instances
List of values
- service ssh match address <ipv4cidr|ipv6cidr> tcp-forwarding
- SDE
M10-Smart
M2
RS420
Enables TCP forwarding
- service ssh match address <ipv4cidr|ipv6cidr> x11-forwarding
- SDE
M10-Smart
M2
RS420
Enables X11 forwarding
When X11 forwarding is enabled, there may be additional exposure to the server and to client displays if the SSH proxy is configured to listen on the wildcard address (though this is not the default). Additionally, the authentication spoofing and authentication data verification and substitution occur on the client side. The security risk of using X11 forwarding is that the client’s X11 display server may be exposed to attach when the SSH client requests forwarding). A system administrator may have a stance in which they want to protect clients that may expose themselves to attack by unwittingly requesting X11 forwarding, which can warrant a “no” setting.
- service ssh match host <ipv4|ipv6>
- SDE
M10-Smart
M2
RS420
- Values
ipv4 – Specific configuration for matched hosts
ipv6 – Specific configuration for matched hosts
- Instances
Multiple
- service ssh match host <ipv4|ipv6> agent-forwarding
- SDE
M10-Smart
M2
RS420
Enables SSH agent forwarding
- service ssh match host <ipv4|ipv6> disable-password-authentication
- SDE
M10-Smart
M2
RS420
Disables the login using password authentication
- service ssh match host <ipv4|ipv6> disable-pubkey-authentication
- SDE
M10-Smart
M2
RS420
Disables the login using public key authentication
- service ssh match host <ipv4|ipv6> disable-tty
- SDE
M10-Smart
M2
RS420
Specifies whether pty allocation is permitted
- service ssh match host <ipv4|ipv6> keepalive-count-max <u32>
- SDE
M10-Smart
M2
RS420
Number of keepalive messages to be sent without any response from the client
- Values
u32 – Disables connection termination (0)
u32 – Number of messages to be sent (1-65535)
- service ssh match host <ipv4|ipv6> keepalive-interval <u32>
- SDE
M10-Smart
M2
RS420
Timeout interval in seconds after which SSH will send a message requesting a response
- Values
u32 – Seconds (0-65535)
- service ssh match host <ipv4|ipv6> log-level <txt>
- SDE
M10-Smart
M2
RS420
Specific log-level to use. Each level logs their own messages and “higher” levels ones
- Values
quiet – Log no messages
fatal – Fatal messages
error – Error messages
info – Informational messages
verbose – More informational messages
debug – Debugging messages
debug2 – More debugging messages
debug3 – Even more debugging messages
- service ssh match host <ipv4|ipv6> max-sessions <u32>
- SDE
M10-Smart
M2
RS420
Maximum number of open shell, login or subsystem sessions allowed per connection
- Values
u32 – No shell, login and subsystem sessions are allowed (but forwarding allowed) (0)
u32 – Disable session multiplexing (1)
u32 – Maximum number of sessions allowed (2-65535)
- service ssh match host <ipv4|ipv6> permit-empty-passwords
- SDE
M10-Smart
M2
RS420
Whether the server allows login to accounts with empty password strings
This feature only takes place when password authentication is enabled.
- service ssh match host <ipv4|ipv6> permit-open <fqdn|ipv4|ipv6>
- SDE
M10-Smart
M2
RS420
Specifies destinations to which TCP port forwarding is permitted
- Values
fqdn – Host to allow forwarding TCP connections to
ipv4 – IPv4 address to allow forwarding TCP connections to
ipv6 – IPv6 address to allow forwarding TCP connections to
- Instances
Multiple
- Required
- service ssh match host <ipv4|ipv6> permit-open <fqdn|ipv4|ipv6> port <u32>
- SDE
M10-Smart
M2
RS420
Port to allow forwarding TCP connections to
- Values
u32 – Port to allow forwarding connection to (1-65535)
- Instances
List of values
- service ssh match host <ipv4|ipv6> tcp-forwarding
- SDE
M10-Smart
M2
RS420
Enables TCP forwarding
- service ssh match host <ipv4|ipv6> x11-forwarding
- SDE
M10-Smart
M2
RS420
Enables X11 forwarding
When X11 forwarding is enabled, there may be additional exposure to the server and to client displays if the SSH proxy is configured to listen on the wildcard address (though this is not the default). Additionally, the authentication spoofing and authentication data verification and substitution occur on the client side. The security risk of using X11 forwarding is that the client’s X11 display server may be exposed to attach when the SSH client requests forwarding). A system administrator may have a stance in which they want to protect clients that may expose themselves to attack by unwittingly requesting X11 forwarding, which can warrant a “no” setting.
- service ssh match role <id>
- SDE
M10-Smart
M2
RS420
- Values
id – Specific configuration for matched roles
- Instances
Multiple
- service ssh match role <id> agent-forwarding
- SDE
M10-Smart
M2
RS420
Enables SSH agent forwarding
- service ssh match role <id> disable-password-authentication
- SDE
M10-Smart
M2
RS420
Disables the login using password authentication
- service ssh match role <id> disable-pubkey-authentication
- SDE
M10-Smart
M2
RS420
Disables the login using public key authentication
- service ssh match role <id> disable-tty
- SDE
M10-Smart
M2
RS420
Specifies whether pty allocation is permitted
- service ssh match role <id> keepalive-count-max <u32>
- SDE
M10-Smart
M2
RS420
Number of keepalive messages to be sent without any response from the client
- Values
u32 – Disables connection termination (0)
u32 – Number of messages to be sent (1-65535)
- service ssh match role <id> keepalive-interval <u32>
- SDE
M10-Smart
M2
RS420
Timeout interval in seconds after which SSH will send a message requesting a response
- Values
u32 – Seconds (0-65535)
- service ssh match role <id> log-level <txt>
- SDE
M10-Smart
M2
RS420
Specific log-level to use. Each level logs their own messages and “higher” levels ones
- Values
quiet – Log no messages
fatal – Fatal messages
error – Error messages
info – Informational messages
verbose – More informational messages
debug – Debugging messages
debug2 – More debugging messages
debug3 – Even more debugging messages
- service ssh match role <id> max-sessions <u32>
- SDE
M10-Smart
M2
RS420
Maximum number of open shell, login or subsystem sessions allowed per connection
- Values
u32 – No shell, login and subsystem sessions are allowed (but forwarding allowed) (0)
u32 – Disable session multiplexing (1)
u32 – Maximum number of sessions allowed (2-65535)
- service ssh match role <id> permit-empty-passwords
- SDE
M10-Smart
M2
RS420
Whether the server allows login to accounts with empty password strings
This feature only takes place when password authentication is enabled.
- service ssh match role <id> permit-open <fqdn|ipv4|ipv6>
- SDE
M10-Smart
M2
RS420
Specifies destinations to which TCP port forwarding is permitted
- Values
fqdn – Host to allow forwarding TCP connections to
ipv4 – IPv4 address to allow forwarding TCP connections to
ipv6 – IPv6 address to allow forwarding TCP connections to
- Instances
Multiple
- Required
- service ssh match role <id> permit-open <fqdn|ipv4|ipv6> port <u32>
- SDE
M10-Smart
M2
RS420
Port to allow forwarding TCP connections to
- Values
u32 – Port to allow forwarding connection to (1-65535)
- Instances
List of values
- service ssh match role <id> tcp-forwarding
- SDE
M10-Smart
M2
RS420
Enables TCP forwarding
- service ssh match role <id> x11-forwarding
- SDE
M10-Smart
M2
RS420
Enables X11 forwarding
When X11 forwarding is enabled, there may be additional exposure to the server and to client displays if the SSH proxy is configured to listen on the wildcard address (though this is not the default). Additionally, the authentication spoofing and authentication data verification and substitution occur on the client side. The security risk of using X11 forwarding is that the client’s X11 display server may be exposed to attach when the SSH client requests forwarding). A system administrator may have a stance in which they want to protect clients that may expose themselves to attack by unwittingly requesting X11 forwarding, which can warrant a “no” setting.
- service ssh match user <txt>
- SDE
M10-Smart
M2
RS420
Specific configuration for matched users
- Reference
- Instances
Multiple
- service ssh match user <txt> agent-forwarding
- SDE
M10-Smart
M2
RS420
Enables SSH agent forwarding
- service ssh match user <txt> disable-password-authentication
- SDE
M10-Smart
M2
RS420
Disables the login using password authentication
- service ssh match user <txt> disable-pubkey-authentication
- SDE
M10-Smart
M2
RS420
Disables the login using public key authentication
- service ssh match user <txt> disable-tty
- SDE
M10-Smart
M2
RS420
Specifies whether pty allocation is permitted
- service ssh match user <txt> keepalive-count-max <u32>
- SDE
M10-Smart
M2
RS420
Number of keepalive messages to be sent without any response from the client
- Values
u32 – Disables connection termination (0)
u32 – Number of messages to be sent (1-65535)
- service ssh match user <txt> keepalive-interval <u32>
- SDE
M10-Smart
M2
RS420
Timeout interval in seconds after which SSH will send a message requesting a response
- Values
u32 – Seconds (0-65535)
- service ssh match user <txt> log-level <txt>
- SDE
M10-Smart
M2
RS420
Specific log-level to use. Each level logs their own messages and “higher” levels ones
- Values
quiet – Log no messages
fatal – Fatal messages
error – Error messages
info – Informational messages
verbose – More informational messages
debug – Debugging messages
debug2 – More debugging messages
debug3 – Even more debugging messages
- service ssh match user <txt> max-sessions <u32>
- SDE
M10-Smart
M2
RS420
Maximum number of open shell, login or subsystem sessions allowed per connection
- Values
u32 – No shell, login and subsystem sessions are allowed (but forwarding allowed) (0)
u32 – Disable session multiplexing (1)
u32 – Maximum number of sessions allowed (2-65535)
- service ssh match user <txt> permit-empty-passwords
- SDE
M10-Smart
M2
RS420
Whether the server allows login to accounts with empty password strings
This feature only takes place when password authentication is enabled.
- service ssh match user <txt> permit-open <fqdn|ipv4|ipv6>
- SDE
M10-Smart
M2
RS420
Specifies destinations to which TCP port forwarding is permitted
- Values
fqdn – Host to allow forwarding TCP connections to
ipv4 – IPv4 address to allow forwarding TCP connections to
ipv6 – IPv6 address to allow forwarding TCP connections to
- Instances
Multiple
- Required
- service ssh match user <txt> permit-open <fqdn|ipv4|ipv6> port <u32>
- SDE
M10-Smart
M2
RS420
Port to allow forwarding TCP connections to
- Values
u32 – Port to allow forwarding connection to (1-65535)
- Instances
List of values
- service ssh match user <txt> tcp-forwarding
- SDE
M10-Smart
M2
RS420
Enables TCP forwarding
- service ssh match user <txt> x11-forwarding
- SDE
M10-Smart
M2
RS420
Enables X11 forwarding
When X11 forwarding is enabled, there may be additional exposure to the server and to client displays if the SSH proxy is configured to listen on the wildcard address (though this is not the default). Additionally, the authentication spoofing and authentication data verification and substitution occur on the client side. The security risk of using X11 forwarding is that the client’s X11 display server may be exposed to attach when the SSH client requests forwarding). A system administrator may have a stance in which they want to protect clients that may expose themselves to attack by unwittingly requesting X11 forwarding, which can warrant a “no” setting.
- service ssh max-sessions <u32>
- SDE
M10-Smart
M2
RS420
Maximum number of open shell, login or subsystem sessions allowed per connection
- Values
u32 – No shell, login and subsystem sessions are allowed (but forwarding allowed) (0)
u32 – Disable session multiplexing (1)
u32 – Maximum number of sessions allowed (2-65535)
- service ssh permit-empty-passwords
- SDE
M10-Smart
M2
RS420
Whether the server allows login to accounts with empty password strings
This feature only takes place when password authentication is enabled.
- service ssh permit-open <fqdn|ipv4|ipv6>
- SDE
M10-Smart
M2
RS420
Specifies destinations to which TCP port forwarding is permitted
- Values
fqdn – Host to allow forwarding TCP connections to
ipv4 – IPv4 address to allow forwarding TCP connections to
ipv6 – IPv6 address to allow forwarding TCP connections to
- Instances
Multiple
- Required
- service ssh permit-open <fqdn|ipv4|ipv6> port <u32>
- SDE
M10-Smart
M2
RS420
Port to allow forwarding TCP connections to
- Values
u32 – Port to allow forwarding connection to (1-65535)
- Instances
List of values
- service ssh port <u32>
- SDE
M10-Smart
M2
RS420
Port for SSH service
- Values
u32 – Numeric IP port (1-32767)
u32 – Numeric IP port (60000-65535)
- service ssh tcp-forwarding
- SDE
M10-Smart
M2
RS420
Enables TCP forwarding
- service ssh vrf <id>
- SDE
M10-Smart
M2
RS420
VRF interface to run SSH on
- Reference
- service ssh x11-forwarding
- SDE
M10-Smart
M2
RS420
Enables X11 forwarding
When X11 forwarding is enabled, there may be additional exposure to the server and to client displays if the SSH proxy is configured to listen on the wildcard address (though this is not the default). Additionally, the authentication spoofing and authentication data verification and substitution occur on the client side. The security risk of using X11 forwarding is that the client’s X11 display server may be exposed to attach when the SSH client requests forwarding). A system administrator may have a stance in which they want to protect clients that may expose themselves to attack by unwittingly requesting X11 forwarding, which can warrant a “no” setting.