Secure Shell Commands
25-15
25
Secure Shell Commands
This section describes the commands used to configure the SSH server. Note that
you also need to install a SSH client on the management station when using this
protocol to configure the switch.
Note:
The switch supports both SSH Version 1.5 and 2.0 clients.
Configuration Guidelines
The SSH server on this switch supports both password and public key
authentication. If password authentication is specified by the SSH client, then the
password can be authenticated either locally or via a RADIUS or remote
authentication server, as specified by the
authentication login
command on
page 25-4. If public key authentication is specified by the client, then you must
configure authentication keys on both the client and the switch as described in the
following section. Note that regardless of whether you use public key or password
authentication, you still have to generate authentication keys on the switch and
enable the SSH server.
Table 25-10 Secure Shell Commands
Command
Function
Mode
Page
ip ssh server
Enables the SSH server on the switch
GC
25-17
ip ssh timeout
Specifies the authentication timeout for the SSH server
GC
25-18
ip ssh
authentication-retries
Specifies the number of retries allowed by a client
GC
25-19
ip ssh server-key size Sets the SSH server key size
GC
25-19
copy tftp public-key
Copies the user’s public key from a TFTP server to the switch PE
23-11
delete public-key
Deletes the public key for the specified user
PE
25-20
ip ssh crypto host-key
generate
Generates the host key
PE
25-20
ip ssh crypto zeroize
Clear the host key from RAM
PE
25-21
ip ssh save host-key
Saves the host key from RAM to flash memory
PE
25-21
disconnect
Terminates a line connection
PE
23-24
show ip ssh
Displays the status of the SSH server and the configured values
for authentication timeout and retries
PE
25-22
show ssh
Displays the status of current SSH sessions
PE
25-22
show public-key
Shows the public key for the specified user or for the host
PE
25-23
show users
Shows SSH users, including privilege level and public key type PE
23-7
Summary of Contents for 8926EM
Page 6: ...ii ...
Page 34: ...Getting Started ...
Page 44: ...Introduction 1 10 1 ...
Page 62: ...Initial Configuration 2 18 2 ...
Page 64: ...Switch Management ...
Page 76: ...Configuring the Switch 3 12 3 ...
Page 118: ...Basic Management Tasks 4 42 4 ...
Page 164: ...User Authentication 6 28 6 ...
Page 176: ...Access Control Lists 7 12 7 ...
Page 284: ...Quality of Service 14 8 14 ...
Page 294: ...Multicast Filtering 15 10 15 ...
Page 300: ...Domain Name Service 16 6 16 ...
Page 310: ...Dynamic Host Configuration Protocol 17 10 17 ...
Page 320: ...Configuring Router Redundancy 18 10 18 ...
Page 344: ...IP Routing 19 24 19 ...
Page 356: ...Unicast Routing 20 12 20 Web Click Routing Protocol RIP Statistics Figure 20 5 RIP Statistics ...
Page 386: ...Unicast Routing 20 42 20 ...
Page 388: ...Command Line Interface ...
Page 400: ...Overview of the Command Line Interface 21 12 21 ...
Page 466: ...SNMP Commands 24 16 24 ...
Page 520: ...Access Control List Commands 26 18 26 ...
Page 546: ...Rate Limit Commands 30 2 30 ...
Page 612: ...VLAN Commands 34 24 34 ...
Page 626: ...Class of Service Commands 35 14 35 ...
Page 670: ...DHCP Commands 39 16 39 ...
Page 716: ...IP Interface Commands 41 36 41 ...
Page 768: ...IP Routing Commands 42 52 42 ...
Page 770: ...Appendices ...
Page 791: ......