Secure Shell Commands 41

Secure Shell Commands

This section describes the commands used to configure the SSH server. Note that you also need to install a SSH client on the management station when using this protocol to configure the switch.

Note: The switch supports both SSH Version 1.5 and 2.0 clients.

Table 41-10 Secure Shell Commands

Command

Function

Mode

Page

 

 

 

 

ip ssh server

Enables the SSH server on the switch

GC

41-17

 

 

 

 

ip ssh timeout

Specifies the authentication timeout for the SSH server

GC

41-18

 

 

 

 

ip ssh

Specifies the number of retries allowed by a client

GC

41-19

authentication-retries

 

 

 

ip ssh server-key size

Sets the SSH server key size

GC

41-19

 

 

 

 

copy tftp public-key

Copies the user’s public key from a TFTP server to the switch

PE

35-2

 

 

 

 

delete public-key

Deletes the public key for the specified user

PE

41-20

 

 

 

 

ip ssh crypto host-key

Generates the host key

PE

41-20

generate

 

 

 

ip ssh crypto zeroize

Clear the host key from RAM

PE

41-21

 

 

 

 

ip ssh save host-key

Saves the host key from RAM to flash memory

PE

41-21

 

 

 

 

disconnect

Terminates a line connection

PE

36-9

 

 

 

 

show ip ssh

Displays the status of the SSH server and the configured values

PE

41-22

 

for authentication timeout and retries

 

 

show ssh

Displays the status of current SSH sessions

PE

41-22

 

 

 

 

show public-key

Shows the public key for the specified user or for the host

PE

41-23

 

 

 

 

show users

Shows SSH users, including privilege level and public key type

PE

34-7

 

 

 

 

Configuration Guidelines

The SSH server on this switch supports both password and public key authentication. If password authentication is specified by the SSH client, then the password can be authenticated either locally or via a RADIUS or TACACS+ remote authentication server, as specified by the authentication login command on page 41-3.If public key authentication is specified by the client, then you must configure authentication keys on both the client and the switch as described in the following section. Note that regardless of whether you use public key or password authentication, you still have to generate authentication keys on the switch and enable the SSH server.

To use the SSH server, complete these steps:

1.Generate a Host Key Pair – Use the ip ssh crypto host-key generate command to create a host public/private key pair.

41-15

Page 367
Image 367
Accton Technology ES4524D Secure Shell Commands Function Mode, Sets the SSH server key size 41-19 Copy tftp public-key