Table 4-15 secure shell commands -46 – SMC Networks SMC Tiger 10/100 SMC6128L2 User Manual

Page 346

Advertising
background image

C

OMMAND

L

INE

I

NTERFACE

4-46

Note: The switch supports both SSH Version 1.5 and 2.0.

The SSH server on this switch supports both password and public key
authentication. If password authentication is specified by the SSH client,
then the password can be authenticated either locally or via a RADIUS or
TACACS+ remote authentication server, as specified by the
authentication login command on page 4-92. If public key
authentication is specified by the client, then you must configure
authentication keys on both the client and the switch as described in the

Table 4-15 Secure Shell Commands

Command

Function

Mode Page

ip ssh server

Enables the SSH server on the switch

GC

4-48

ip ssh timeout

Specifies the authentication timeout for the
SSH server

GC

4-49

ip ssh
authentication-retries

Specifies the number of retries allowed by a
client

GC

4-50

ip ssh server-key size Sets the SSH server key size

GC

4-51

copy tftp public-key Copies the user’s public key from a TFTP

server to the switch

PE

4-84

delete public-key

Deletes the public key for the specified user PE

4-51

ip ssh crypto
host-key generate

Generates the host key

PE

4-52

ip ssh crypto zeroize Clear the host key from RAM

PE

4-53

ip ssh save host-key Saves the host key from RAM to flash

memory

PE

4-53

disconnect

Terminates a line connection

PE

4-24

show ip ssh

Displays the status of the SSH server and
the configured values for authentication
timeout and retries

PE

4-54

show ssh

Displays the status of current SSH sessions PE

4-54

show public-key

Shows the public key for the specified user
or for the host

PE

4-56

show users

Shows SSH users, including privilege level
and public key type

PE

4-81

Advertising