Security Commands
1064
Command Mode
Global Configuration mode
User Guidelines
DSA keys are generated in pairs: one public DSA key and one private DSA
key. These keys are used the encrypt communication with the switch when
using SSH or HTTPS. If your switch already has DSA keys when you issue this
command, you are warned and prompted to replace the existing keys. Existing
certificates generated from the previous keys will be invalidated.The keys are
not saved in the switch configuration; they are saved in the file system and
the private key is never displayed to the user. DSA keys, along with other
switch credentials, are distributed to all units in a stack on a configuration
save.
Use the
crypto key zeroize dsa
command to remove the DSA key pair from
the system.
Private keys should never be shared with unauthorized users. This command
generates the following private/public key pair in the ssh_host_dsa_key and
ssh_host_dsa_key.pub files. Both the RSA and DSA keys must be generated to
enable the SSH server.
Example
The following example generates DSA key pairs.
console(config)#crypto key generate dsa
crypto key generate rsa
Use the
crypto key generate rsa
command in Global Configuration mode to
generate RSA key pairs for use by the SSH or HTTPS server. Use the
crypto
key zeroize
form of the command to delete the private key from the local file
system.
Syntax
crypto key generate rsa
Default Configuration
RSA key pairs do not exist.
Summary of Contents for N1100-ON
Page 2: ......
Page 4: ......
Page 258: ...Using the CLI 258 ...
Page 488: ...Layer 2 Switching Commands 488 Operational State Querier Operational version 1 ...
Page 656: ...Layer 2 Switching Commands 656 10 ...
Page 1128: ...Audio Visual Bridging Commands 1128 ...
Page 1186: ...Data Center Technology Commands 1186 ...
Page 1435: ...Layer 3 Routing Commands 1435 Number of Joins 7 Number of Groups 1 ...
Page 2330: ......
Page 2331: ...www dell com support dell com Printed in the U S A ...
Page 2332: ......