Secure shell commands, Secure shell commands -21, Table 22-10 secure shell commands -21 – SMC Networks TigerAccess SMC7816M User Manual

Page 561

Advertising
background image

S

ECURE

S

HELL

C

OMMANDS

22-21

Secure Shell Commands

This section describes the commands used to configure the SSH server.
Note that you also need to install a SSH client on the management station
when using this protocol to configure the switch.

Note: The switch supports both SSH Version 1.5 and 2.0 clients.

Table 22-10 Secure Shell Commands

Command

Function

Mode Page

ip ssh server

Enables the SSH server on the switch

GC

22-25

ip ssh timeout

Specifies the authentication timeout for the
SSH server

GC

22-26

ip ssh
authentication-retries

Specifies the number of retries allowed by a
client

GC

22-27

ip ssh server-key size Sets the SSH server key size

GC

22-27

copy tftp public-key Copies the user’s public key from a TFTP

server to the switch

PE

20-17

delete public-key

Deletes the public key for the specified user PE

22-28

ip ssh crypto
host-key generate

Generates the host key

PE

22-28

ip ssh crypto zeroize Clear the host key from RAM

PE

22-29

ip ssh save host-key Saves the host key from RAM to flash

memory

PE

22-30

disconnect

Terminates a line connection

PE

20-36

show ip ssh

Displays the status of the SSH server and
the configured values for authentication
timeout and retries

PE

22-31

show ssh

Displays the status of current SSH sessions PE

22-31

show public-key

Shows the public key for the specified user
or for the host

PE

22-32

show users

Shows SSH users, including privilege level
and public key type

PE

20-9

Advertising
This manual is related to the following products: