560
|
Security
www.dell.com | support.dell.com
Usage
Information
This command specifies the file to be used for the host-based authentication. The file creates/
overwrites the file flash://ADMIN_DIR/ssh/knownhosts and deletes the user specified file. Even
though this is a global configuration command, it does not appear in the running configuration because
this command needs to be run just once.
The file contains the OpenSSH compatible public keys of the host for which host-based authentication
is allowed. An example known host file format:
poclab4,123.12.1.123 ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAox/
QQp8xYhzOxn07yh4VGPAoUfgKoieTHui+DWEc3cgYAcU5Lai1MU2ODrzhCwyDNp05tKBU3t
ReG1S4hyEMqHzkzBFNRs4p2urzV0F4pRKnaXdHf3Lk4D460HZRhhVrxqeNxPDpEn
WIMPJi0ds= ashwani@poclab4
Related
Commands
ip ssh rhostsfile
Specify the rhost file to be used for host-based authorization.
Syntax
ip ssh rhostsfile
{
WORD
}
Parameters
Defaults
none
Command Modes
CONFIGURATION
Command
History
Example
Figure 29-7. ip ssh rhostsfile Command Example
Usage
Information
This command specifies the rhost file to be used for host-based authentication. This file creates/
overwrites the file flash:/ADMIN_DIR/ssh/shosts and deletes the user specified file. Even though this
is a global configuration command, it does not appear in the running configuration because this
command needs to be run just once.
This file contains hostnames and usernames, for which hosts and users, rhost-authentication can be
allowed.
Note:
For
rhostfile
and
pub-key-file
, the administrator must FTP the file to the chassis.
show ip ssh client-pub-keys
Displays the client-public keys used for the host-based authentication.
WORD
Enter the rhost file name for the host-based authentication.
Version 8.3.16.1
Introduced on MXL 10/40GbE Switch IO Module
FTOS#conf
FTOS(conf)# ip ssh rhostsfile flash://shosts
FTOS(conf)#
Note:
For
rhostfile
and
pub-key-file
, the administrator must FTP the file to the switch.
Summary of Contents for Force10 MXL Blade
Page 80: ...80 Control and Monitoring w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 142: ...142 Access Control Lists ACL w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 146: ...146 Bare Metal Provisioning w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 152: ...152 Content Addressable Memory CAM w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 186: ...186 Data Center Bridging w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 204: ...204 Dynamic Host Configuration Protocol DHCP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 216: ...216 FIP Snooping w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 226: ...226 GARP VLAN Registration GVRP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 234: ...234 Internet Group Management Protocol IGMP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 330: ...330 iSCSI Optimization w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 354: ...354 Layer 2 w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 370: ...370 Link Layer Discovery Protocol LLDP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 384: ...384 Multiple Spanning Tree Protocol MSTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 438: ...438 Port Monitoring w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 448: ...448 Private VLAN PVLAN w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 490: ...490 Quality of Service QoS w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 518: ...518 Remote Monitoring RMON w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 530: ...530 Rapid Spanning Tree Protocol RSTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 570: ...570 Security w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 578: ...578 sFlow w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 620: ...620 Stacking Commands w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 654: ...654 Uplink Failure Detection UFD w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 693: ...Debugging and Diagnostics 693 ...
Page 694: ...694 Debugging and Diagnostics w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 712: ...712 Index w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 713: ...Index 713 ...
Page 714: ...714 Index w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 715: ...Index 715 ...
Page 716: ...716 Index w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 717: ...Index 717 ...
Page 718: ...718 Index w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 728: ...728 Command Index w w w d e l l c o m s u p p o r t d e l l c o m write 78 write memory 25 ...
Page 729: ...Command Index 729 ...
Page 730: ...730 Command Index w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 731: ...Command Index 731 ...
Page 732: ...732 Command Index w w w d e l l c o m s u p p o r t d e l l c o m ...