C
OMMAND
L
INE
I
NTERFACE
4-46
The SSH server on this switch supports both password and public key
authentication. If password authentication is specified by the SSH client,
then the password can be authenticated either locally or via a RADIUS or
remote authentication server, as specified by the
authentication login
command on page 4-94. If public key authentication
is specified by the client, then you must configure authentication keys on
both the client and the switch as described in the following section. Note
that regardless of whether you use public key or password authentication,
you still have to generate authentication keys on the switch and enable the
SSH server.
To use the SSH server, complete these steps:
1.
Generate a Host Key Pair – Use the
ip ssh crypto host-key generate
command to create a host public/private key pair.
ip ssh crypto
host-key generate
Generates the host key
PE
4-52
ip ssh crypto zeroize Clear the host key from RAM
PE
4-53
ip ssh save host-key Saves the host key from RAM to flash
memory
PE
4-54
disconnect
Terminates a line connection
PE
4-24
show ip ssh
Displays the status of the SSH server and
the configured values for authentication
timeout and retries
PE
4-54
show ssh
Displays the status of current SSH sessions PE
4-55
show public-key
Shows the public key for the specified user
or for the host
PE
4-56
show users
Shows SSH users, including privilege level
and public key type
PE
4-83
Table 4-12. Secure Shell Commands
Command
Function
Mode Page
Summary of Contents for 8648T - annexe 1
Page 2: ......
Page 34: ...INTRODUCTION 1 10 ...
Page 48: ...INITIAL CONFIGURATION 2 14 ...
Page 159: ...PORT CONFIGURATION 3 111 Figure 3 48 Displaying Etherlike and RMON Statistics ...
Page 411: ...DNS COMMANDS 4 167 ...
Page 536: ...COMMAND LINE INTERFACE 4 291 ...
Page 542: ...TROUBLESHOOTING B 2 ...
Page 555: ......