Chapter 7
| Authentication Commands
Secure Shell
– 190 –
show ip telnet
This command displays the configuration settings for the Telnet server.
Command Mode
Normal Exec, Privileged Exec
Example
Console#show ip telnet
IP Telnet Configuration:
Telnet Status: Enabled
Telnet Service Port: 23
Telnet Max Session: 4
Console#
Secure Shell
This section describes the commands used to configure the SSH server. Note that
you also need to install a SSH client on the management station when using this
protocol to configure the switch.
Note:
The switch supports both SSH Version 1.5 and 2.0 clients.
Table 41: Secure Shell Commands
Command
Function
Mode
ip ssh
authentication-retries
Specifies the number of retries allowed by a client
GC
ip ssh server
Enables the SSH server on the switch
GC
ip ssh server-key size
Sets the SSH server key size
GC
ip ssh timeout
Specifies the authentication timeout for the SSH server
GC
copy tftp public-key
Copies the user’s public key from a TFTP server to the
switch
PE
delete public-key
Deletes the public key for the specified user
PE
disconnect
Terminates a line connection
PE
ip ssh crypto
host-key generate
Generates the host key
PE
ip ssh crypto zeroize
Clear the host key from RAM
PE
ip ssh save host-key
Saves the host key from RAM to flash memory
PE
show ip ssh
Displays the status of the SSH server and the configured
values for authentication timeout and retries
PE
show public-key
Shows the public key for the specified user or for the host
PE
Summary of Contents for EX-3524
Page 2: ......
Page 28: ...Figures 28 ...
Page 34: ...Section I Getting Started 34 ...
Page 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Page 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Page 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Page 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Page 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Page 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Page 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Page 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Page 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Page 366: ...Chapter 15 Address Table Commands 366 ...
Page 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Page 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Page 578: ...Section I Appendices 578 ...