Secure Shell; Table 62: Secure Shell Commands - Edge-Core ECS4610-24F Management Manual

24-port layer 3 gigabit ethernet switch
Hide thumbs Also See for ECS4610-24F:
Table of Contents

Advertisement

| Authentication Commands
C
27
HAPTER

Secure Shell

S
S
ECURE
HELL
This section describes the commands used to configure the SSH server.
Note that you also need to install a SSH client on the management station
when using this protocol to configure the switch.
The switch supports both SSH Version 1.5 and 2.0 clients.
N
:
OTE

Table 62: Secure Shell Commands

Command
Function
ip ssh authentication-
Specifies the number of retries allowed by a client
retries
ip ssh server
Enables the SSH server on the switch
ip ssh server-key size
Sets the SSH server key size
ip ssh timeout
Specifies the authentication timeout for the SSH
server
copy tftp public-key
Copies the user's public key from a TFTP server to
the switch
delete public-key
Deletes the public key for the specified user
disconnect
Terminates a line connection
ip ssh crypto host-key
Generates the host key
generate
ip ssh crypto zeroize
Clear the host key from RAM
ip ssh save host-key
Saves the host key from RAM to flash memory
show ip ssh
Displays the status of the SSH server and the
configured values for authentication timeout and
retries
show public-key
Shows the public key for the specified user or for the
host
show ssh
Displays the status of current SSH sessions
show users
Shows SSH users, including privilege level and
public key type
Configuration Guidelines
The SSH server on this switch supports both password and public key
authentication. If password authentication is specified by the SSH client,
then the password can be authenticated either locally or via a RADIUS or
TACACS+ remote authentication server, as specified by the
login
command. If public key authentication is specified by the client, then
you must configure authentication keys on both the client and the switch
as described in the following section. Note that regardless of whether you
use public key or password authentication, you still have to generate
authentication keys on the switch and enable the SSH server.
– 684 –
Mode
GC
GC
GC
GC
PE
PE
PE
PE
PE
PE
PE
PE
PE
PE
authentication

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents