1-11
To do...
Use the command…
Remarks
preferred HMAC
algorithms and
preferred key
exchange algorithm
For an IPv4
IPv6 server
ssh2
ipv6
server
[
port-number
] [
identity-key
{
dsa
|
rsa
} |
prefer-ctos-cipher
{
aes128
|
des
} |
prefer-ctos-hmac
{
md5
|
md5-96
|
sha1
|
sha1-96
}
|
prefer-kex
{
dh-group-exchange
|
dh-group1
|
dh-group14
} |
prefer-stoc-cipher
{
aes128
|
des
} |
prefer-stoc-hmac
{
md5
|
md5-96
|
sha1
|
sha1-96
} ] *
Displaying and Maintaining SSH
To do…
Use the command…
Remarks
Display the source IP address or
interface currently set for the SFTP
client
display sftp client source
Available in any view
Display the source IP address or
interface currently set for the SSH
client
display ssh client source
Available in any view
Display SSH server status
information or session information
on an SSH server
display ssh server
{
status
|
session
}
Available in any view
Display the mappings between
SSH servers and their host public
keys saved on an SSH client
display ssh server-info
Available in any view
Display information about a
specified or all SSH users on the
SSH server
display ssh user-information
[
username
]
Available in any view
Display the public keys of the local
key pairs
display public-key local
{
dsa
|
rsa
}
public
Available in any view
Display the public keys of the SSH
peers
display public-key peer
[
brief
|
name publickey-name
]
Available in any view
For information about the
display public-key local
and
display public-key peer
commands, refer to
Public Key Commands
in the
Security Volume
.
SSH Server Configuration Examples
When Switch Acts as Server for Password Authentication
Network requirements
z
As shown in
Figure 1-1
, a local SSH connection is established between the host (the SSH client)
and the switch (the SSH server) for secure data exchange.
z
Password authentication is required. The username and password are saved on the switch.