Secure Shell Commands
41-23
41
show public-key
This command shows the public key for the specified user or for the host.
Syntax
show public-key
[
user
[
username
]|
host
]
username
– Name of an SSH user. (Range: 1-8 characters)
Default Setting
Shows all public keys.
Command Mode
Privileged Exec
Command Usage
• If no parameters are entered, all keys are displayed. If the user keyword is
entered, but no user name is specified, then the public keys for all users are
displayed.
• When an RSA key is displayed, the first field indicates the size of the host key
(e.g., 1024), the second field is the encoded public exponent (e.g., 35), and
the last string is the encoded modulus. When a DSA key is displayed, the first
field indicates that the encryption method used by SSH is based on the Digital
Signature Standard (DSS), and the last string is the encoded modulus.
Encryption
The encryption method is automatically negotiated between the client and server.
Options for SSHv1.5 include: DES, 3DES
Options for SSHv2.0 can include different algorithms for the client-to-server (ctos)
and server-to-client (stoc):
aes128-cbc-hmac-sha1
aes192-cbc-hmac-sha1
aes256-cbc-hmac-sha1
3des-cbc-hmac-sha1
blowfish-cbc-hmac-sha1
aes128-cbc-hmac-md5
aes192-cbc-hmac-md5
aes256-cbc-hmac-md5
3des-cbc-hmac-md5
blowfish-cbc-hmac-md5
Terminology:
DES – Data Encryption Standard (56-bit key)
3DES – Triple-DES (Uses three iterations of DES, 112-bit key)
aes – Advanced Encryption Standard (160 or 224-bit key)
blowfish – Blowfish (32-448 bit key)
cbc – cypher-block chaining
sha1 – Secure Hash Algorithm 1 (160-bit hashes)
md5 – Message Digest algorithm number 5 (128-bit hashes)
Table 41-11 show ssh - display description
(Continued)
Field
Description
Содержание Direk Tronik 24/48-Port
Страница 2: ......
Страница 4: ...ES4524D ES4548D F0 0 0 4 E112006 CS R01 149100030400A...
Страница 22: ...xxii Tables...
Страница 26: ...xxvi Figures...
Страница 28: ...Getting Started...
Страница 50: ...Initial Configuration 2 14 2...
Страница 52: ...Switch Management Configuring Domain Name Service 29 1 Switch Clustering 30 1...
Страница 68: ...Basic System Settings 4 8 4...
Страница 118: ...Simple Network Management Protocol 11 18 11...
Страница 142: ...Configuring 802 1X Port Authentication 14 8 14...
Страница 154: ...Access Control Lists 15 12 15...
Страница 232: ...Configuring Protocol Based VLANs 25 4 25...
Страница 252: ...Quality of Service 27 8 27...
Страница 282: ...Using the Command Line Interface 31 10 31...
Страница 290: ...General Commands 33 6 33...
Страница 300: ...System Management Commands 34 10 34...
Страница 308: ...File Management Commands 35 8 35...
Страница 326: ...Event Logging Commands 37 8 37...
Страница 336: ...Time Commands 39 6 39...
Страница 406: ...Access Control List Commands 44 18 44...
Страница 418: ...Interface Commands 45 12 45...
Страница 432: ...Broadcast Storm Control Commands 47 2 47...
Страница 436: ...Rate Limit Commands 49 2 49...
Страница 478: ...VLAN Commands 52 18 52...
Страница 508: ...Quality of Service Commands 56 10 56...
Страница 518: ...Multicast Filtering Commands 57 10 57...
Страница 532: ...IPv4 Interface Commands 59 6 59...
Страница 560: ...IPv6 Interface Commands 60 28 60...
Страница 566: ...Switch Cluster Commands 61 6 61...
Страница 568: ...Appendices...
Страница 572: ...Software Specifications A 4 A TACACS Authentication Client MIB TCP MIB RFC 2012 Trap RFC 1215 UDP MIB RFC 2013...
Страница 582: ...Glossary Glossary 8...
Страница 587: ......
Страница 588: ...ES4524D ES4548D E112006 CS R01 149100030400A...