Cisco IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor Installation And Configuration Manual page 216

Intrusion detection system appliance and module
Table of Contents

Advertisement

Sensor Initial Configuration Tasks
The MD5 fingerprint appears. You are prompted to add it to the known hosts table:
Would you like to add this to the known hosts table for this
host?[yes]
Step 4
Type yes to have the fingerprint added to the known hosts list.
To view the list of SSH known hosts, type the following command:
Step 5
sensor# show ssh host-keys ip-address
The SSH known hosts information (similar to the following) appears:
1024 35
1393062135418352403853329222539688146856845235200641319978399051136401
2021781686969670872170463132284429207385173056504487908267067755415793
7058485203995572114631296604552161309712601068614812749969593513740598
3313931548849883023021829223533351526538605891636519449978428745836278
83277460138506084043415861927
MD5: 49:3F:FD:62:26:58:94:A3:E9:88:EF:92:5F:52:6E:7B
Bubble Babble:
xebiz-vykyk-fekuh-rukuh-cabaz-paret-gosym-serum-korus-fypop-huxyx
Step 6
To remove an entry, type the following command:
sensor(config)# no ssh host-key
For example, to remove host 10.16.0.0 from the list of SSH known hosts, type the
following command:
sensor(config-SshKnownHosts)# no ssh host-key 10.16.0.0
The host is removed from the SSH known hosts list. You can verify the removal
by typing the following command:
sensor(config-SshKnownHosts)# show settings
The SSH known hosts information (similar to the following) appears:
rsa1Keys (min: 0, max: 500, current: 0)
Exit service mode for SSH known hosts:
Step 7
sensor(config-SshKnownHosts)# exit
You are prompted to apply the changes:
Apply Changes:?[yes]:
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
10-20
Chapter 10
Configuring the Sensor Using the CLI
ip_address
78-15597-02

Advertisement

Table of Contents
loading

Table of Contents