Specifications
16-18
Cisco Unity Express Voice-Mail and Auto-Attendant CLI Administrator Guide for 3.0 and Later Versions
OL-14010-09
Chapter 16 Backing Up and Restoring Data
Encrypting and Signing of Backup Content on the Server
4. show security ssh knowhost
DETAILED STEPS
Encrypting and Signing of Backup Content on the Server
This section discusses the following topics:
• Overview, page 18
• Configuring the Encryption and Signing of Backup Content on the Server, page 19
Overview
Starting in release 3.0, you can protect backed up configuration and data files using signing and
encryption before the files are transferred to the backup server.
To enable this feature, you must configure a master key, from which the encryption and signing key
(known as the session key) are derived. The backup files are encrypted and signed before they are sent
to the backup server. When you restore the files, the master key is used to validate the integrity of the
files and decrypt them accordingly. You can also restore the backup files to any other machine running
Command or Action Purpose
Step 1
config t
Example:
se-10-0-0-0# config t
Enters configuration mode.
Step 2
security ssh knownhost host {ssh-rsa | ssh-dsa}
fingerprint-string
Example:
se-10-0-0-0(config)# security ssh knownhost
server.cisco.com ssh-rsa
a5:3a:12:6d:e9:48:a3:34:be:8f:ee:50:30:e5:e6:c3
Configures the MD5 fingerprint of the SSH server’s
host key using the following arguments and
keywords:
host — Fully qualified hostname or IP address of the
SSH server.
ssh-rsa — RSA algorithm was used to create this
fingerprint for a SSH server’s host key.
ssh-dsa — DSA algorithm was used to create this
fingerprint for a SSH server’s host key.
fingerprint-string — MD5 fingerprint string.
Step 3
end
Example:
se-10-0-0-0(config)# end
Returns to privileged EXEC mode.
Step 4
show security ssh knownhost
Example:
se-10-0-0-0(config)# show security ssh knownhost
Displays a list of configured SSH servers and their
fingerprints.