S
YSTEM
M
ANAGEMENT
C
OMMANDS
4-47
name and password for access authentication. SSH also encrypts all data
transfers passing between the switch and SSH-enabled management
station clients, and ensures that data traveling over the network arrives
unaltered.
This section describes the commands used to configure the SSH server.
However, note that you also need to install a SSH client on the
management station when using this protocol to configure the switch.
Note:
The switch supports both SSH Version 1.5 and 2.0 clients.
Table 4-15 Secure Shell Commands
Command
Function
Mode Page
ip ssh server
Enables the SSH server on the switch
GC
4-50
ip ssh timeout
Specifies the authentication timeout for the
SSH server
GC
4-51
ip ssh
authentication-re
tries
Specifies the number of retries allowed by a
client
GC
4-52
ip ssh server-key
size
Sets the SSH server key size
GC
4-52
copy tftp
public-key
Copies the user’s public key from a TFTP
server to the switch
PE
4-87
delete public-key Deletes the public key for the specified user
PE
4-53
ip ssh crypto
host-key generate
Generates the host key
PE
4-53
ip ssh crypto
zeroize
Clear the host key from RAM
PE
4-54
ip ssh save
host-key
Saves the host key from RAM to flash memory PE
4-55
disconnect
Terminates a line connection
PE
4-25
show ip ssh
Displays the status of the SSH server and the
configured values for authentication timeout
and retries
PE
4-56
Summary of Contents for 8708L2
Page 2: ......
Page 24: ...TABLES xxiv ...
Page 28: ...FIGURES xxviii ...
Page 290: ...CONFIGURING THE SWITCH 3 238 ...
Page 584: ...COMMAND LINE INTERFACE 4 294 ...
Page 592: ...TROUBLESHOOTING B 4 ...
Page 605: ......