
Chapter 8
| Authentication Commands
Secure Shell
– 254 –
Example
Console#show ip ssh
SSH Enabled - Version 2.0
Negotiation Timeout : 120 seconds; Authentication Retries : 3
Server Key Size : 768 bits
Console#
show public-key
This command shows the public key for the specified user or for the host.
Syntax
show public-key
[
user
[
username
]|
host
]
username
– Name of an SSH user. (Range: 1-32 characters)
Default Setting
Shows all public keys.
Command Mode
Privileged Exec
Command Usage
◆
If no parameters are entered, all keys are displayed. If the user keyword is
entered, but no user name is specified, then the public keys for all users are
displayed.
◆
When an RSA key is displayed, the first field indicates the size of the host key
(e.g., 1024), the second field is the encoded public exponent (e.g., 35), and the
last string is the encoded modulus. When a DSA key is displayed, the first field
indicates that the encryption method used by SSH is based on the Digital
Signature Standard (DSS), and the last string is the encoded modulus.
Example
Console#show public-key host
Host:
RSA:
1024 65537 13236940658254764031382795526536375927835525327972629521130241
071942106165575942459093923609695405036277525755625100386613098939383452310
332802149888661921595568598879891919505883940181387440468908779160305837768
185490002831341625008348718449522087429212255691665655296328163516964040831
5547660664151657116381
DSA:
ssh-dss AAAB3NzaC1kc3MAAACBAPWKZTPbsRIB8ydEXcxM3dyV/yrDbKStIlnzD/Dg0h2Hxc
YV44sXZ2JXhamLK6P8bvuiyacWbUW/a4PAtp1KMSdqsKeh3hKoA3vRRSy1N2XFfAKxl5fwFfv
JlPdOkFgzLGMinvSNYQwiQXbKTBH0Z4mUZpE85PWxDZMaCNBPjBrRAAAAFQChb4vsdfQGNIjwbv
wrNLaQ77isiwAAAIEAsy5YWDC99ebYHNRj5kh47wY/p9cnrfwFTMU01VFDly3IR
2G395NLy5Qd7ZDxfA9mCOfT/yyEfbobMJZi8oGCstSNOxrZZVnMqWrTYfdrKX7YKBw/Kjw6Bm
iFq7O+jAhf1Dg45loAc27s6TLdtny1wRq/ow2eTCD5nekAAACBAJ8rMccXTxHLFAczWS7EjOy
DbsloBfPuSAb4oAsyjKXKVYNLQkTLZfcFRu41bS2KV5LAwDjKGWtPNIQqabKgYCw2
o/yqdTlYmGA7fHGm8ARGeiG4ssFKy4Z6DmYPXFum1Yg0fhLwuHpOSKdxT3kk475S7
w0W
Console#
Содержание ECS4120-28F
Страница 36: ...Contents 36...
Страница 38: ...Figures 38...
Страница 46: ...Section I Getting Started 46...
Страница 70: ...Chapter 1 Initial Switch Configuration Setting the System Clock 70...
Страница 86: ...Chapter 2 Using the Command Line Interface CLI Command Groups 86...
Страница 202: ...Chapter 5 SNMP Commands Additional Trap Commands 202...
Страница 210: ...Chapter 6 Remote Monitoring Commands 210...
Страница 216: ...Chapter 7 Flow Sampling Commands 216...
Страница 278: ...Chapter 8 Authentication Commands PPPoE Intermediate Agent 278...
Страница 360: ...Chapter 9 General Security Measures Port based Traffic Segmentation 360...
Страница 384: ...Chapter 10 Access Control Lists ACL Information 384...
Страница 424: ...Chapter 11 Interface Commands Power Savings 424...
Страница 446: ...Chapter 13 Power over Ethernet Commands 446...
Страница 456: ...Chapter 14 Port Mirroring Commands RSPAN Mirroring Commands 456...
Страница 488: ...Chapter 17 UniDirectional Link Detection Commands 488...
Страница 494: ...Chapter 18 Address Table Commands 494...
Страница 554: ...Chapter 20 ERPS Commands 554...
Страница 620: ...Chapter 22 Class of Service Commands Priority Commands Layer 3 and 4 620...
Страница 638: ...Chapter 23 Quality of Service Commands 638...
Страница 772: ...Chapter 25 LLDP Commands 772...
Страница 814: ...Chapter 26 CFM Commands Delay Measure Operations 814...
Страница 826: ...Chapter 27 OAM Commands 826 1 1 00 12 CF 6A 07 F6 000084 Enabled Disabled Enabled Disabled Console...
Страница 836: ...Chapter 28 Domain Name Service Commands 836...
Страница 848: ...Chapter 29 DHCP Commands DHCP Relay Option 82 848...
Страница 902: ...Section III Appendices 902...
Страница 916: ...Glossary 916...
Страница 926: ...CLI Commands 926...
Страница 937: ......
Страница 938: ...E092017 CS R02...