Security: SSH Server
SSH Server Configuration Pages
Cisco Small Business 300 Series Managed Switch Administration Guide 394
20
STEP 3 You can perform any of the following actions:
Generate—Generates a key of the selected type.
Edit—Enables you to copy in a key from another device.
Delete—Enables you to delete a key.
Details—Enables you to view the generated key. The Details window also
enables you to click Display Sensitive Data as Plaintext. If this is clicked, the
keys are displayed as plaintext and not in encrypted form. If the key is
already being displayed as plaintext, you can click Display Sensitive Data as
Encrypted. to display the text in encryp ted form.
STEP 4 If new keys were copied in from another, click Apply. The key(s) are stored in the
Running Configuration file.