![SMC Networks 7824M/FSW - annexe 1 Management Manual Download Page 154](http://html.mh-extra.com/html/smc-networks/7824m-fsw-annexe-1/7824m-fsw-annexe-1_management-manual_1300676154.webp)
U
SER
A
UTHENTICATION
6-16
CLI
– This example generates a host-key pair using both the RSA and
DSA algorithms, stores the keys to flash memory, and then displays the
host’s public keys.
Configuring the SSH Server
The SSH server includes basic settings for authentication.
Field Attributes
•
SSH Server Status
– Allows you to enable/disable the SSH server on
the switch. (Default: Disabled)
•
Version
– The Secure Shell version number. Version 2.0 is displayed, but
the switch supports management access via either SSH Version 1.5 or 2.0
clients.
•
SSH Authentication Timeout
– Specifies the time interval in seconds
that the SSH server waits for a response from a client during an
authentication attempt.
(Range: 1 to 120 seconds; Default: 120 seconds)
Console#ip ssh crypto host-key generate
21-28
Console#ip ssh save host-key
21-30
Console#show public-key host
21-32
Host:
RSA:
1024 65537
127250922544926402131336514546131189679055192360076028653006761
8240969094744832010252487896597759216832222558465238779154647980739
6314033869257931051057652122430528078658854857892726029378660892368
4142327591212760325919683697053439336438445223335188287173896894511
729290510813919642025190932104328579045764891
DSA:
ssh-dss AAAAB3NzaC1kc3MAAACBAN6zwIqCqDb3869jYVXlME1sHL0EcE/Re6hlas
fEthIwmj hLY4O0jqJZpcEQUgCfYlum0Py9ieGWQ8f2gobUZKIICuKg6v
jO9XTs7XKc05xfzk26vFOgvUDFedlh5v8r0ea2rpnO6
DkZAAAAFQCNZn/x17dwpW8RrVDQ6QAAAIEAptkGeB6B5hwagH4gUOCY6i1
TmrmSiJgfwO9OqRPUuzxatOo7drSx5R9ywsa1cWqHeF
Y5ilc3lDCNBueeRS+azTKIk/zrJh8GLG Nq375R55yRxFvmcGIn/Q7Iph
PqyJ3o9MK8LFDfmJEAAACAL8A6tESiswP2OFqX7VGoEbzVDSOIRTMFy3iUXtvGyQAOV
Sy67Mfc3lMtgqPRUOYXDiwIBp5NXgilCg5z7VqbmRm28mWc5a//f8TUAgPNWKV6W
0hqmshQdoXKNTZj0uTwWfjO5Kytdn4MdoTHgrbl/DMdAfjnte8MZZs=
Console#
Summary of Contents for 7824M/FSW - annexe 1
Page 2: ......
Page 24: ...TABLE OF CONTENTS xxiv ...
Page 28: ...TABLES xxviii ...
Page 32: ...FIGURES xxxii Figure 16 3 DNS Cache 16 7 ...
Page 34: ...GETTING STARTED ...
Page 46: ...SYSTEM DEFAULTS 1 12 ...
Page 62: ...SWITCH MANAGEMENT ...
Page 74: ...CONFIGURING THE SWITCH 3 12 ...
Page 112: ...BASIC MANAGEMENT TASKS 4 38 ...
Page 168: ...USER AUTHENTICATION 6 30 ...
Page 223: ...SHOWING PORT STATISTICS 9 33 Figure 9 12 Port Statistics ...
Page 230: ...ADDRESS TABLE SETTINGS 10 6 ...
Page 304: ...CLASS OF SERVICE 13 16 ...
Page 316: ...QUALITY OF SERVICE 14 12 ...
Page 338: ...MULTICAST FILTERING 15 22 ...
Page 346: ...DOMAIN NAME SERVICE 16 8 ...
Page 348: ...COMMAND LINE INTERFACE IP Interface Commands 35 1 ...
Page 362: ...OVERVIEW OF COMMAND LINE INTERFACE 17 14 ...
Page 494: ...USER AUTHENTICATION COMMANDS 21 48 ...
Page 514: ...CLIENT SECURITY COMMANDS 22 20 ...
Page 540: ...ACCESS CONTROL LIST COMMANDS 23 26 ...
Page 558: ...INTERFACE COMMANDS 24 18 ...
Page 576: ...MIRROR PORT COMMANDS 26 4 ...
Page 582: ...RATE LIMIT COMMANDS 27 6 ...
Page 616: ...SPANNING TREE COMMANDS 29 28 ...
Page 644: ...VLAN COMMANDS 30 28 ...
Page 664: ...CLASS OF SERVICE COMMANDS 31 20 ...
Page 678: ...QUALITY OF SERVICE COMMANDS 32 14 ...
Page 720: ...APPENDICES ...
Page 726: ...SOFTWARE SPECIFICATIONS A 6 ...
Page 730: ...TROUBLESHOOTING B 4 ...
Page 746: ...INDEX Index 6 ...
Page 747: ......