SMC Networks TigerSwitch User Manual

Page 290

Advertising
background image

C

OMMAND

L

INE

I

NTERFACE

4-48

The SSH server on this switch supports both password and public key
authentication. If password authentication is specified by the SSH client,
then the password can be authenticated either locally or via a RADIUS or
TACACS+ remote authentication server, as specified by the
authentication login command on page 4-96. If public key authentication
is specified by the client, then you must configure authentication keys on
both the client and the switch as described in the following section. Note
that regardless of whether you use public key or password authentication,
you still have to generate authentication keys on the switch and enable the
SSH server.

To use the SSH server, complete these steps:

1. Generate a Host Key Pair – Use the ip ssh crypto host-key generate

command to create a host public/private key pair.

delete public-key Deletes the public key for the specified user

PE

4-53

ip ssh crypto
host-key generate

Generates the host key

PE

4-53

ip ssh crypto
zeroize

Clear the host key from RAM

PE

4-54

ip ssh save
host-key

Saves the host key from RAM to flash memory PE

4-55

disconnect

Terminates a line connection

PE

4-25

show ip ssh

Displays the status of the SSH server and the
configured values for authentication timeout
and retries

PE

4-56

show ssh

Displays the status of current SSH sessions

PE

4-56

show public-key Shows the public key for the specified user or

for the host

PE

4-57

show users

Shows SSH users, including privilege level and
public key type

PE

4-85

Table 4-15 SSH Commands (Continued)

Command

Function

Mode

Page

Advertising