Configuring the Secure Shell
12-11
12
Web
– Click Security, SSH, Host-Key Settings. Select the host-key type from the
drop-down box, select the option to save the host key from memory to flash (if
required) prior to generating the key, and then click Generate.
Figure 12-5 SSH Host-Key Settings
CLI
– This example generates a host-key pair using both the RSA and DSA
algorithms, stores the keys to flash memory, and then displays the host’s public keys.
Console#ip ssh crypto host-key generate
41-20
Console#ip ssh save host-key
41-21
Console#show public-key host
41-23
Host:
RSA:
1024 65537 127250922544926402131336514546131189679055192360076028653006761
82409690947448320102524878965977592168322225584652387791546479807396314033
86925793105105765212243052807865885485789272602937866089236841423275912127
60325919683697053439336438445223335188287173896894511729290510813919642025
190932104328579045764891
DSA:
ssh-dss AAAAB3NzaC1kc3MAAACBAN6zwIqCqDb3869jYVXlME1sHL0EcE/Re6hlasfEthIwmj
hLY4O0jqJZpcEQUgCfYlum0Py9ieGWQ8f2gobUZKIICuKg6vjO9XTs7XKc05xfzkBi
KviDa+26vFOgvUDFedlh5v8r0ea2rpnO6DkZAAAAFQCNZn/x17dwpW8RrV
DQ6QAAAIEAptkGeB6B5hwagH4gUOCY6i1TmrmSiJgfwO9OqRPUuzxatOo7
drSx5R9ywsa1cWqHeFY5ilc3lDCNBueeRS+azTKIk/zrJh8GLG
Nq375R55yRxFvmcGIn/Q7IphPqyJ3o9MK8LFDfmJEAAACAL8A6tESiswP2OFqX7VGoEbzVDSOI
RTMFy3iUXtvGyQAOVSy67Mfc3lMtgqPRUOYXDiwIBp5NXgilCg5z7VqbmRm28mWc5a//f8TUAg
PNWKV6W0hqmshQdoXKNTZj0uTwWfjO5Kytdn4MdoTHgrbl/DMdAfjnte8MZZs=
Console#
Summary of Contents for Direk Tronik 24/48-Port
Page 2: ......
Page 4: ...ES4524D ES4548D F0 0 0 4 E112006 CS R01 149100030400A...
Page 22: ...xxii Tables...
Page 26: ...xxvi Figures...
Page 28: ...Getting Started...
Page 50: ...Initial Configuration 2 14 2...
Page 52: ...Switch Management Configuring Domain Name Service 29 1 Switch Clustering 30 1...
Page 68: ...Basic System Settings 4 8 4...
Page 118: ...Simple Network Management Protocol 11 18 11...
Page 142: ...Configuring 802 1X Port Authentication 14 8 14...
Page 154: ...Access Control Lists 15 12 15...
Page 232: ...Configuring Protocol Based VLANs 25 4 25...
Page 252: ...Quality of Service 27 8 27...
Page 282: ...Using the Command Line Interface 31 10 31...
Page 290: ...General Commands 33 6 33...
Page 300: ...System Management Commands 34 10 34...
Page 308: ...File Management Commands 35 8 35...
Page 326: ...Event Logging Commands 37 8 37...
Page 336: ...Time Commands 39 6 39...
Page 406: ...Access Control List Commands 44 18 44...
Page 418: ...Interface Commands 45 12 45...
Page 432: ...Broadcast Storm Control Commands 47 2 47...
Page 436: ...Rate Limit Commands 49 2 49...
Page 478: ...VLAN Commands 52 18 52...
Page 508: ...Quality of Service Commands 56 10 56...
Page 518: ...Multicast Filtering Commands 57 10 57...
Page 532: ...IPv4 Interface Commands 59 6 59...
Page 560: ...IPv6 Interface Commands 60 28 60...
Page 566: ...Switch Cluster Commands 61 6 61...
Page 568: ...Appendices...
Page 582: ...Glossary Glossary 8...
Page 587: ......
Page 588: ...ES4524D ES4548D E112006 CS R01 149100030400A...