Secure shell commands, Secure shell commands -21, Table 21-10 secure shell commands -21 – SMC Networks SMC TigerAccess SMC7824M/FSW User Manual

Page 467

Advertising
background image

S

ECURE

S

HELL

C

OMMANDS

21-21

Secure Shell Commands

This section describes the commands used to configure the SSH server.
Note that you also need to install a SSH client on the management station
when using this protocol to configure the switch.

Note: The switch supports both SSH Version 1.5 and 2.0 clients.

Table 21-10 Secure Shell Commands

Command

Function

Mode Page

ip ssh server

Enables the SSH server on the switch

GC

21-24

ip ssh timeout

Specifies the authentication timeout for the
SSH server

GC

21-25

ip ssh
authentication-retries

Specifies the number of retries allowed by a
client

GC

21-26

ip ssh server-key size Sets the SSH server key size

GC

21-27

copy tftp public-key Copies the user’s public key from a TFTP

server to the switch

PE

19-16

delete public-key

Deletes the public key for the specified user PE

21-28

ip ssh crypto
host-key generate

Generates the host key

PE

21-28

ip ssh crypto zeroize Clear the host key from RAM

PE

21-29

ip ssh save host-key Saves the host key from RAM to flash

memory

PE

21-30

disconnect

Terminates a line connection

PE

19-33

show ip ssh

Displays the status of the SSH server and
the configured values for authentication
timeout and retries

PE

21-31

show ssh

Displays the status of current SSH sessions PE

21-31

show public-key

Shows the public key for the specified user
or for the host

PE

21-32

show users

Shows SSH users, including privilege level
and public key type

PE

19-8

Advertising