
Chapter 8
| Authentication Commands
Secure Shell
– 246 –
Secure Shell
This section describes the commands used to configure the SSH server. Note that
you also need to install a SSH client on the management station when using this
protocol to configure the switch.
Note:
The switch supports both SSH Version 1.5 and 2.0 clients.
Configuration Guidelines
The SSH server on this switch supports both password and public key
authentication. If password authentication is specified by the SSH client, then the
password can be authenticated either locally or via a RADIUS or remote
authentication server, as specified by the
command. If public
key authentication is specified by the client, then you must configure
authentication keys on both the client and the switch as described in the following
section. Note that regardless of whether you use public key or password
authentication, you still have to generate authentication keys on the switch and
enable the SSH server.
Table 46: Secure Shell Commands
Command
Function
Mode
Specifies the number of retries allowed by a client
GC
Enables the SSH server on the switch
GC
Sets the SSH server key size
GC
Specifies the authentication timeout for the SSH server
GC
copy tftp public-key
Copies the user’s public key from a TFTP server to the
switch
PE
Deletes the public key for the specified user
PE
Terminates a line connection
PE
ip ssh crypto
host-key generate
Generates the host key
PE
Clear the host key from RAM
PE
Saves the host key from RAM to flash memory
PE
Displays the status of the SSH server and the configured
values for authentication timeout and retries
PE
Shows the public key for the specified user or for the host
PE
Displays the status of current SSH sessions
PE
Shows SSH users, including privilege level and public key
type
PE
Содержание ECS4120-28F
Страница 36: ...Contents 36...
Страница 38: ...Figures 38...
Страница 46: ...Section I Getting Started 46...
Страница 70: ...Chapter 1 Initial Switch Configuration Setting the System Clock 70...
Страница 86: ...Chapter 2 Using the Command Line Interface CLI Command Groups 86...
Страница 202: ...Chapter 5 SNMP Commands Additional Trap Commands 202...
Страница 210: ...Chapter 6 Remote Monitoring Commands 210...
Страница 216: ...Chapter 7 Flow Sampling Commands 216...
Страница 278: ...Chapter 8 Authentication Commands PPPoE Intermediate Agent 278...
Страница 360: ...Chapter 9 General Security Measures Port based Traffic Segmentation 360...
Страница 384: ...Chapter 10 Access Control Lists ACL Information 384...
Страница 424: ...Chapter 11 Interface Commands Power Savings 424...
Страница 446: ...Chapter 13 Power over Ethernet Commands 446...
Страница 456: ...Chapter 14 Port Mirroring Commands RSPAN Mirroring Commands 456...
Страница 488: ...Chapter 17 UniDirectional Link Detection Commands 488...
Страница 494: ...Chapter 18 Address Table Commands 494...
Страница 554: ...Chapter 20 ERPS Commands 554...
Страница 620: ...Chapter 22 Class of Service Commands Priority Commands Layer 3 and 4 620...
Страница 638: ...Chapter 23 Quality of Service Commands 638...
Страница 772: ...Chapter 25 LLDP Commands 772...
Страница 814: ...Chapter 26 CFM Commands Delay Measure Operations 814...
Страница 826: ...Chapter 27 OAM Commands 826 1 1 00 12 CF 6A 07 F6 000084 Enabled Disabled Enabled Disabled Console...
Страница 836: ...Chapter 28 Domain Name Service Commands 836...
Страница 848: ...Chapter 29 DHCP Commands DHCP Relay Option 82 848...
Страница 902: ...Section III Appendices 902...
Страница 916: ...Glossary 916...
Страница 926: ...CLI Commands 926...
Страница 937: ......
Страница 938: ...E092017 CS R02...