Secure Shell Commands
This section describes the commands used to configure the SSH server.
Note that you also need to install a SSH client on the management station
when using this protocol to configure the switch.
Note: The switch supports both SSH Version 1.5 and 2.0 clients.
Command
ip ssh server
ip ssh timeout
ip ssh
authentication-retries
ip ssh server-key size Sets the SSH server key size
copy tftp public-key Copies the user's public key from a TFTP
delete public-key
ip ssh crypto
host-key generate
ip ssh crypto zeroize Clear the host key from RAM
ip ssh save host-key
disconnect
show ip ssh
show ssh
show public-key
show users
Table 22-10 Secure Shell Commands
Function
Enables the SSH server on the switch
Specifies the authentication timeout for the
SSH server
Specifies the number of retries allowed by a
client
server to the switch
Deletes the public key for the specified user PE
Generates the host key
Saves the host key from RAM to flash
memory
Terminates a line connection
Displays the status of the SSH server and
the configured values for authentication
timeout and retries
Displays the status of current SSH sessions PE
Shows the public key for the specified user
or for the host
Shows SSH users, including privilege level
and public key type
S
S
ECURE
HELL
Mode Page
GC
GC
GC
GC
PE
PE
PE
PE
PE
PE
PE
PE
C
OMMANDS
22-24
22-25
22-26
22-27
20-13
22-28
22-28
22-29
22-30
20-31
22-31
22-31
22-32
20-9
22-21
Need help?
Do you have a question about the TigerStack II SMC8848M and is the answer not in the manual?