![SMC Networks TigerSwitch 1000 Скачать руководство пользователя страница 273](http://html1.mh-extra.com/html/smc-networks/tigerswitch-1000/tigerswitch-1000_management-manual_1300422273.webp)
S
YSTEM
M
ANAGEMENT
C
OMMANDS
4-51
Example
ip ssh crypto host-key generate
This command generates the host key pair (i.e., public and private).
Syntax
ip ssh crypto host-key generate
[
dsa
|
rsa
]
•
dsa
– DSA (Version 2) key type.
•
rsa
– RSA (Version 1) key type.
Default Setting
Generates both the DSA and RSA key pairs.
Command Mode
Privileged Exec
Command Usage
• This command stores the host key pair in memory (i.e., RAM). Use the
ip ssh save host-key
command to save the host key pair to flash
memory.
• Some SSH client programs automatically add the public key to the
known hosts file as part of the configuration process. Otherwise, you
must manually create a known hosts file and place the host public key
in it.
• The SSH server uses this host key to negotiate a session key and
encryption method with the client trying to connect to it.
Example
Related Commands
ip ssh crypto zeroize (4-52)
ip ssh save host-key (4-52)
Console#delete public-key admin dsa
Console#
Console#ip ssh crypto host-key generate dsa
Console#
Содержание TigerSwitch 1000
Страница 2: ......
Страница 19: ...CONTENTS xv...
Страница 23: ...TABLES xix...
Страница 36: ...INTRODUCTION 1 10...
Страница 155: ...PORT CONFIGURATION 3 107 Figure 3 50 Displaying Etherlike and RMON Statistics...
Страница 222: ...CONFIGURING THE SWITCH 3 174...
Страница 417: ...VLAN COMMANDS 4 195 This section describes commands used to configure private VLANs...
Страница 466: ...TROUBLESHOOTING B 4...
Страница 479: ......