C
OMMAND
L
INE
I
NTERFACE
4-48
The SSH server on this switch supports both password and public key
authentication. If password authentication is specified by the SSH client,
then the password can be authenticated either locally or via a RADIUS or
remote authentication server, as specified by the
authentication login
command on page 4-96. If public key authentication
is specified by the client, then you must configure authentication keys on
both the client and the switch as described in the following section. Note
that regardless of whether you use public key or password authentication,
you still have to generate authentication keys on the switch and enable the
SSH server.
To use the SSH server, complete these steps:
1.
Generate a Host Key Pair – Use the
ip ssh crypto host-key generate
command to create a host public/private key pair.
delete public-key Deletes the public key for the specified user
PE
4-53
ip ssh crypto
host-key generate
Generates the host key
PE
4-53
ip ssh crypto
zeroize
Clear the host key from RAM
PE
4-54
ip ssh save
host-key
Saves the host key from RAM to flash memory PE
4-55
disconnect
Terminates a line connection
PE
4-25
show ip ssh
Displays the status of the SSH server and the
configured values for authentication timeout
and retries
PE
4-56
show ssh
Displays the status of current SSH sessions
PE
4-56
show public-key Shows the public key for the specified user or
for the host
PE
4-57
show users
Shows SSH users, including privilege level and
public key type
PE
4-85
Table 4-15 SSH Commands
(Continued)
Command
Function
Mode
Page
Summary of Contents for TigerSwitch
Page 2: ......
Page 19: ...CONTENTS xv Glossary Index...
Page 20: ...CONTENTS xvi...
Page 36: ...INTRODUCTION 1 10...
Page 504: ...TROUBLESHOOTING B 4...
Page 517: ......