
C
HAPTER
28
| Authentication Commands
Secure Shell
– 1063 –
E
XAMPLE
Console#delete public-key admin dsa
Console#
ip ssh crypto
host-key generate
This command generates the host key pair (i.e., public and private).
S
YNTAX
ip ssh crypto host-key generate
[
dsa
|
rsa
]
dsa
– DSA (Version 2) key type.
rsa
– RSA (Version 1) key type.
D
EFAULT
S
ETTING
Generates both the DSA and RSA key pairs.
C
OMMAND
M
ODE
Privileged Exec
C
OMMAND
U
SAGE
◆
The switch uses only RSA Version 1 for SSHv1.5 clients and DSA
Version 2 for SSHv2 clients.
◆
This command stores the host key pair in memory (i.e., RAM). Use the
command to save the host key pair to flash
memory.
◆
Some SSH client programs automatically add the public key to the
known hosts file as part of the configuration process. Otherwise, you
must manually create a known hosts file and place the host public key
in it.
◆
The SSH server uses this host key to negotiate a session key and
encryption method with the client trying to connect to it.
E
XAMPLE
Console#ip ssh crypto host-key generate dsa
Console#
R
ELATED
C
OMMANDS
Summary of Contents for ECS4660-28F
Page 1: ...Management Guide www edge core com ECS4660 28F Layer 3 Gigabit Ethernet Switch...
Page 2: ......
Page 4: ......
Page 12: ...ABOUT THIS GUIDE 12...
Page 64: ...CONTENTS 64...
Page 90: ...TABLES 90...
Page 92: ...SECTION I Getting Started 92...
Page 122: ...SECTION II Web Configuration 122 Multicast Routing on page 825...
Page 148: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 148...
Page 224: ...CHAPTER 5 Interface Configuration VLAN Trunking 224 Figure 68 Configuring VLAN Trunking...
Page 262: ...CHAPTER 6 VLAN Configuration Configuring VLAN Translation 262...
Page 304: ...CHAPTER 9 Congestion Control Automatic Traffic Control 304...
Page 340: ...CHAPTER 11 Quality of Service Attaching a Policy Map to a Port 340...
Page 452: ...CHAPTER 13 Security Measures DHCP Snooping 452...
Page 740: ...CHAPTER 17 IP Services Configuring the PPPoE Intermediate Agent 740...
Page 866: ...CHAPTER 21 Multicast Routing Configuring PIMv6 for IPv6 866...
Page 882: ...CHAPTER 22 Using the Command Line Interface CLI Command Groups 882...
Page 1024: ...CHAPTER 26 Remote Monitoring Commands 1024...
Page 1030: ...CHAPTER 27 Flow Sampling Commands 1030...
Page 1088: ...CHAPTER 28 Authentication Commands PPPoE Intermediate Agent 1088...
Page 1162: ...CHAPTER 29 General Security Measures Configuring Port based Traffic Segmentation 1162...
Page 1186: ...CHAPTER 30 Access Control Lists ACL Information 1186...
Page 1214: ...CHAPTER 31 Interface Commands Transceiver Threshold Configuration 1214...
Page 1238: ...CHAPTER 33 Port Mirroring Commands RSPAN Mirroring Commands 1238...
Page 1258: ...CHAPTER 34 Congestion Control Commands Automatic Traffic Control Commands 1258...
Page 1270: ...CHAPTER 36 UniDirectional Link Detection Commands 1270...
Page 1276: ...CHAPTER 37 Address Table Commands 1276...
Page 1336: ...CHAPTER 39 ERPS Commands 1336...
Page 1386: ...CHAPTER 40 VLAN Commands Configuring Voice VLANs 1386...
Page 1406: ...CHAPTER 41 Class of Service Commands Priority Commands Layer 3 and 4 1406...
Page 1424: ...CHAPTER 42 Quality of Service Commands 1424...
Page 1536: ...CHAPTER 43 Multicast Filtering Commands MLD Proxy Routing 1536...
Page 1602: ...CHAPTER 45 CFM Commands Delay Measure Operations 1602...
Page 1624: ...CHAPTER 47 Domain Name Service Commands 1624...
Page 1646: ...CHAPTER 48 DHCP Commands DHCP Server 1646...
Page 1974: ...SECTION IV Appendices 1974...
Page 1980: ...APPENDIX A Software Specifications Management Information Bases 1980...