Administrator Guide

Command History
This guide is platform-specific. For command information about other platforms, refer to the relevant Dell
Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version Description
9.9(0.0) Introduced on the C9010.
9.6(0.0) Introduced on the S -Series and Z-Series switches.
Usage Information The maximum number of characters allowed for the parameters, except the county-name, is 64.
crypto key generate
Generate keys for the SSH server.
C9000 Series
Syntax
NOTE: Some of the parameters in this command require licensing to access. For more information,
contact your Dell Networking representative.
crypto key generate {rsa | rsa1}
Parameters
rsa Enter the keyword rsa then the key size to generate a SSHv2 RSA host keys. The range
is from 1024 to 2048 if you did not enable FIPS mode; if you enabled FIPS mode, you can
only generate a 2048-bit key. The default is 1024.
NOTE: You must have a license to access the FIPS mode. For more
information, contact your Dell Networking representative.
rsa1 Enter the keyword rsa1 then the key size to generate a SSHv1 RSA host keys. The
range is from 1024 to 2048. The default is 1024.
NOTE: This option is not available in FIPS mode.
Defaults Key size 1024; if you enable FIPS mode, the key size is 2048.
Command Modes CONFIGURATION
Command History
This guide is platform-specific. For command information about other platforms, refer to the relevant Dell
Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version Description
9.9(0.0) Introduced on the C9010.
9.2(1.0) Introduced on the Z9500.
8.3.19.0 Introduced on the S4820T.
8.3.11.1 Introduced on the Z9000.
8.3.12.0 Added support for FIPS mode on the S4810.
8.3.7.0 Introduced on the S4810.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
6.1.1.0 Introduced on the E-Series.
Usage Information
The host keys are required for key-exchange by the SSH server. If the keys are not found when you enable the
server (ip ssh server enable), the keys are automatically generated.
This command requires user interaction and generates a prompt prior to overwriting any existing host keys.
1496 Security