Cisco ACE-4710-K9 Administration Guide - Page 86

ssh key, force, clear ssh hosts, clear, ssh hosts, Cisco 4700 Series Application Control Engine

Page 86 highlights

Configuring SSH Management Sessions Chapter 2 Enabling Remote Access to the ACE The syntax of this command is: ssh key {dsa | rsa | rsa1} [bits [force]] The arguments, keywords, and options are: • dsa-Generates the DSA key pair for the SSH version 2 protocol. • rsa-Generates the RSA key pair for the SSH version 2 protocol. • rsa1-Generates the RSA1 key pair for the SSH version 1 protocol. • bits-(Optional) Specifies the number of bits for the key pair. For DSA, the range is from 768 to 2048. For RSA and RSA1, the range is from 768 to 4096. The greater the number of bits that you specify, the longer it takes to generate the key. The default is 768. • force-(Optional) Forces the generation of a DSA or RSA key even when previous keys exist. If the SSH key pair option is already generated for the required version, use the force option to overwrite the previously generated key pair. Before you generate the key, set the hostname and the domain name. These two settings are used in the key. See Chapter 1, Setting Up the ACE, for details on setting a hostname and to the Cisco 4700 Series Application Control Engine Appliance Virtualization Configuration Guide for details on configuring a domain. For example, to generate an RSA1 key pair in the Admin context, enter: host1/Admin(config)# ssh key rsa1 1024 generating rsa1 key ..... generated rsa1 key To remove the SSH host key pair, enter: host1/Admin(config)# no ssh key rsa1 To clear the public keys of all trusted hosts, use the clear ssh hosts Exec command. These keys are either sent to an SSH client by an SSH server or are entered manually. When a SSH connection is made from the ACE, the SSH client receives the public key and stores it locally. To clear all these keys, use the clear ssh hosts command in Exec mode. 2-18 Cisco 4700 Series Application Control Engine Appliance Administration Guide OL-11157-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418

Chapter 2
Enabling Remote Access to the ACE
Configuring SSH Management Sessions
2-18
Cisco 4700 Series Application Control Engine Appliance Administration Guide
OL-11157-01
The syntax of this command is:
ssh key
{
dsa
|
rsa
|
rsa1
} [
bits
[
force
]]
The arguments, keywords, and options are:
dsa
—Generates the DSA key pair for the SSH version 2 protocol.
rsa
—Generates the RSA key pair for the SSH version 2 protocol.
rsa1
—Generates the RSA1 key pair for the SSH version 1 protocol.
bits—
(Optional) Specifies the number of bits for the key pair. For DSA, the
range is from 768 to 2048. For RSA and RSA1, the range is from 768 to 4096.
The greater the number of bits that you specify, the longer it takes to generate
the key. The default is 768.
force
—(Optional) Forces the generation of a DSA or RSA key even when
previous keys exist. If the SSH key pair option is already generated for the
required version, use the
force
option to overwrite the previously generated
key pair.
Before you generate the key, set the hostname and the domain name. These two
settings are used in the key. See
Chapter 1, Setting Up the ACE
, for details on
setting a hostname and to the
Cisco 4700 Series Application Control Engine
Appliance Virtualization Configuration Guide
for details on configuring a
domain.
For example, to generate an RSA1 key pair in the Admin context, enter:
host1/Admin(config)#
ssh key rsa1 1024
generating rsa1 key
.....
generated rsa1 key
To remove the SSH host key pair, enter:
host1/Admin(config)#
no ssh key rsa1
To clear the public keys of all trusted hosts, use the
clear ssh hosts
Exec
command. These keys are either sent to an SSH client by an SSH server or are
entered manually. When a SSH connection is made from the ACE, the SSH client
receives the public key and stores it locally. To clear all these keys, use the
clear
ssh hosts
command in Exec mode.