Ssh - Cisco CSACS-1121-K9 Reference Manual

Reference guide
Hide thumbs Also See for CSACS-1121-K9:
Table of Contents

Advertisement

Appendix A
ACS Command Reference

ssh

To start an encrypted session with a remote system, use the ssh command in the EXEC mode.
An Admin or Operator (user) can use this command (see
Note
Syntax Description
ip-address
hostname
username
port [number]
version [1 | 2]
delete hostkey
word
Defaults
Disabled.
Command Modes
EXEC (Admin or Operator)
Usage Guidelines
The ssh command enables a system to make a secure, encrypted connection to another remote system or
server. This connection provides functionality similar to that of an outbound Telnet connection except
that the connection is encrypted. With authentication and encryption, the SSH client allows for secure
communication over an insecure network.
Examples
Example 1
acs/admin# ssh delete hostkey mtm-sun8
acs/admin#
Example 2
acs/admin# ssh acs2 admin
admin@acs2's password:
Last login: Wed Jul 11 05:53:20 2008 from ACS.cisco.com
acs2/admin#
OL-18996-01
ssh [ip-address | hostname] username port [number] version [1 | 2] delete hostkey word
IP address of the remote system. Up to 64 alphanumeric characters.
Hostname of the remote system. Up to 64 alphanumeric characters.
Username of the user logging in through SSH.
(Optional) Indicates the port number of the remote host. From 0 to 65,535.
Default 22.
(Optional) Indicates the version number. Default 2.
Deletes the SSH fingerprint of a specific host.
IPv4 address or hostname of a remote system. Up to 64 alphanumeric
characters.
Table
CLI Reference Guide for the Cisco Secure Access Control System 5.1
EXEC Commands
1-1).
A-51

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents