System Management Commands 4

This section describes the commands used to configure the SSH server. However, note that you also need to install a SSH client on the management station when using this protocol to configure the switch.

Note: The switch supports both SSH Version 1.5 and 2.0 clients.

Table 4-15 Secure Shell Commands

Command

Function

Mode

Page

 

 

 

 

ip ssh server

Enables the SSH server on the switch

GC

4-35

 

 

 

 

ip ssh timeout

Specifies the authentication timeout for the SSH server

GC

4-35

 

 

 

 

ip ssh

Specifies the number of retries allowed by a client

GC

4-36

authentication-retries

 

 

 

ip ssh server-key size

Sets the SSH server key size

GC

4-36

 

 

 

 

copy tftp public-key

Copies the user’s public key from a TFTP server to the switch

PE

4-63

 

 

 

 

delete public-key

Deletes the public key for the specified user

PE

4-37

 

 

 

 

ip ssh crypto host-key

Generates the host key

PE

4-37

generate

 

 

 

ip ssh crypto zeroize

Clear the host key from RAM

PE

4-38

 

 

 

 

ip ssh save host-key

Saves the host key from RAM to flash memory

PE

4-39

 

 

 

 

disconnect

Terminates a line connection

PE

4-17

 

 

 

 

show ip ssh

Displays the status of the SSH server and the configured values

PE

4-39

 

for authentication timeout and retries

 

 

show ssh

Displays the status of current SSH sessions

PE

4-39

 

 

 

 

show public-key

Shows the public key for the specified user or for the host

PE

4-40

 

 

 

 

show users

Shows SSH users, including privilege level and public key type

PE

4-61

 

 

 

 

The SSH server on this switch supports both password and public key authentication. If password authentication is specified by the SSH client, then the password can be authenticated either locally or via a RADIUS or TACACS+ remote authentication server, as specified by the authentication login command on page 4-69.If public key authentication is specified by the client, then you must configure authentication keys on both the client and the switch as described in the following section. Note that regardless of whether you use public key or password authentication, you still have to generate authentication keys on the switch and enable the SSH server.

To use the SSH server, complete these steps:

1.Generate a Host Key Pair – Use the ip ssh crypto host-key generate command to create a host public/private key pair.

2.Provide Host Public Key to Clients – Many SSH client programs automatically import the host public key during the initial connection setup with the switch. Otherwise, you need to manually create a known hosts file on the management

4-33