beautypg.com

Event logging commands, Event logging commands -58, Table 4-17 event logging commands -58 – SMC Networks SMC TigerStack III SMC6824MPE User Manual

Page 320

background image

C

OMMAND

L

INE

I

NTERFACE

4-58

Command Usage

• If no parameters are entered, all keys are displayed. If the user keyword

is entered, but no user name is specified, then the public keys for all users
are displayed.

• When an RSA key is displayed, the first field indicates the size of the host

key (e.g., 1024), the second field is the encoded public exponent (e.g., 35),
and the last string is the encoded modulus. When a DSA key is displayed,
the first field indicates that the encryption method used by SSH is based
on the Digital Signature Standard (DSS), and the last string is the
encoded modulus.

Example

Event Logging Commands

Console#show public-key host
Host:
RSA:
1024 35

1568499540186766925933394677505461732531367489083654725415020245593
1998685443583616519999233297817660658309586108259132128902337654680
1726272571413428762941301196195566782595664104869574278881462065194
1746772984865468615717739390164779355942303577413098022737087794545
24083971752646358058176716709574804776117

DSA:
ssh-dss AAAB3NzaC1kc3MAAACBAPWKZTPbsRIB8ydEXcxM3dyV/yrDbKStIlnzD/

Dg0h2Hxc YV44sXZ2JXhamLK6P8bvuiyacWbUW/
a4PAtp1KMSdqsKeh3hKoA3vRRSy1N2XFfAKxl5fwFfv
JlPdOkFgzLGMinvSNYQwiQXbKTBH0Z4mUZpE85PWxDZMaCNBPjBrRAAAAFQChb4vsdf
QGNIjwbvwrNLaQ77isiwAAAIEAsy5YWDC99ebYHNRj5kh47wY4i8cZvH+/
p9cnrfwFTMU01VFDly3IR 2G395NLy5Qd7ZDxfA9mCOfT/
yyEfbobMJZi8oGCstSNOxrZZVnMqWrTYfdrKX7YKBw/Kjw6Bm
iFq7O+jAhf1Dg45loAc27s6TLdtny1wRq/
ow2eTCD5nekAAACBAJ8rMccXTxHLFAczWS7EjOy
DbsloBfPuSAb4oAsyjKXKVYNLQkTLZfcFRu41bS2KV5LAwecsigF/
+DjKGWtPNIQqabKgYCw2 o/
dVzX4Gg+yqdTlYmGA7fHGm8ARGeiG4ssFKy4Z6DmYPXFum1Yg0fhLwuHpOSKdxT3kk4
75S7 w0W

Console#

Table 4-17 Event Logging Commands

Command

Function

Mode Page

logging on

Controls logging of error messages

GC

4-59

logging history

Limits syslog messages saved to switch memory
based on severity

GC

4-60