Chapter 19, Ssh commands, Ssh commands -1 – Efficient Networks 107-0001-000 User Manual
Page 487

Chapter 19: SSH Commands
Efficient Networks
®
Page 19-1
CHAPTER 19
CHAPTER 19
SSH COMMANDS
The commands in this section are used to Secure Shell (SSH) connections. For
additional information Secure Shell, see
SSH
in
Chapter 5, System Security
.
The commands found in this section include:
Table 19-1: SSH Command Listing
Command
Function
List the supported SSH sub-commands.
Generates the Private-Public key-pair for the local
server.
Displays the current SSH configuration with the ex-
ception of the list of public-private key pairs and the
configured SSH port.
Loads a precomputed private-key, from the speci-
fied TFTP server.
Loads a precomputed public-key, from the speci-
fied TFTP server.
Sets the type of encryption the SSH connections
will use.
Sets the idle timeout period for SSH connections.
Enables and disables keepalive messages trans-
mission.
Sets the type of message authentication code use
for SSH connections.
Sets the interval between key re-exchange.
Enables and disables SSH connections.
Manages system SSH port access.