Secure shell commands, Secure shell commands -21, Table 22-10 secure shell commands -21 – SMC Networks TigerAccess SMC7816M User Manual
Page 561
S
ECURE
S
HELL
C
OMMANDS
22-21
Secure Shell Commands
This section describes the commands used to configure the SSH server.
Note that you also need to install a SSH client on the management station
when using this protocol to configure the switch.
Note: The switch supports both SSH Version 1.5 and 2.0 clients.
Table 22-10 Secure Shell Commands
Command
Function
Mode Page
ip ssh server
Enables the SSH server on the switch
GC
ip ssh timeout
Specifies the authentication timeout for the
SSH server
GC
ip ssh
authentication-retries
Specifies the number of retries allowed by a
client
GC
ip ssh server-key size Sets the SSH server key size
GC
copy tftp public-key Copies the user’s public key from a TFTP
server to the switch
PE
delete public-key
Deletes the public key for the specified user PE
ip ssh crypto
host-key generate
Generates the host key
PE
ip ssh crypto zeroize Clear the host key from RAM
PE
ip ssh save host-key Saves the host key from RAM to flash
memory
PE
disconnect
Terminates a line connection
PE
show ip ssh
Displays the status of the SSH server and
the configured values for authentication
timeout and retries
PE
show ssh
Displays the status of current SSH sessions PE
show public-key
Shows the public key for the specified user
or for the host
PE
show users
Shows SSH users, including privilege level
and public key type
PE