Secure Shell Commands - Planet IGSW-2840 User Manual

24-port 10/100mbps + 4 gigabit tp/sfp combo industrial managed switch
Table of Contents

Advertisement

5.12.8 Secure Shell Commands

This section describes the commands used to configure the SSH server. However, note that you also need to install a SSH
client on the management station when using this protocol to configure the switch.
The Industrial Managed Switch supports both SSH Version 1.5 and 2.0.
Command
ip ssh server
ip ssh timeout
ip ssh authentication-retries
ip ssh server-key size
copy tftp public-key
delete public-key
ip ssh crypto host-key generate
ip ssh crypto zeroize
ip ssh save host-key
disconnect
show ip ssh
show ssh
show public-key
show users
Configuration Guidelines
The SSH server on this Industrial Managed Switch supports both password and public key authentication. If password
authentication is specified by the SSH client, then the password can be authenticated either locally or via a RADIUS or
TACACS+ remote authentication server, as specified by the authentication login command. If public key authentication is
specified by the client, then you must configure authentication keys on both the client and the Industrial Managed Switch as
described in the following section. Note that regardless of whether you use public key or password authentication, you still have
to generate authentication keys on the Industrial Managed Switch and enable the SSH server.
To use the SSH server, complete these steps:
1.
Generate a Host Key Pair – Use the ip ssh crypto host-key generate command to create a host public/private key pair.
2.
Provide Host Public Key to Clients – Many SSH client programs automatically import the host public key during the initial
connection setup with the switch. Otherwise, you need to manually create a known hosts file on the management station
Function
Enables the SSH server on the switch
Specifies the authentication timeout for the SSH server
Specifies the number of retries allowed by a client
Sets the SSH server key size
Copies the user's public key from a TFTP server to the switch
Deletes the public key for the specified user
Generates the host key
Clear the host key from RAM
Saves the host key from RAM to flash memory
Terminates a line connection
Displays the status of the SSH server and the configured
valuesfor authentication timeout and retries
Displays the status of current SSH sessions
Shows the public key for the specified user or for the host
Shows SSH users, including privilege level and public key type
Table 5-36 Secure Shell Commands
445
User's Manual of IGSW-2840
Mode
GC
GC
GC
GC
PE
PE
PE
PE
PE
PE
PE
PE
PE
PE

Advertisement

Table of Contents
loading

Table of Contents