CLI Guide
ip ssh rsa-authentication (EXEC)
Add keys for the RSA authentication.
Syntax
ip ssh rsa-authentication {my-authorized-keys WORD}
To delete the authorized keys, use the no ip ssh rsa-authentication {my-authorized-keys}
command.
Parameters
my-authorized-keys
WORD
Enter the keywords my-authorized-keys then the lename of the RSA authorized-
keys.
Defaults none
Command Modes EXEC
Supported Modes Full–Switch
Command History
Version Description
9.9(0.0) Introduced on the FN IOM.
8.3.16.1 Introduced on the MXL 10/40GbE Switch IO Module.
Usage Information
If you want to log in without being prompted for a password, log in through RSA authentication. To do that, rst
add the SSHv2 RSA public keys to the list of authorized keys. This command adds the specied RSA keys to the
following le: flash://ADMIN_DIR/ssh/authorized-keys-username (where username is the user
associated with this terminal).
NOTE: The no form of this command deletes the le flash://ADMIN_DIR/ssh/ authorized-
keys-username le.
Related Commands
show ip ssh rsa-authentication — displays the RSA authorized keys.
ip ssh rsa-authentication (Cong) — enables RSA authentication.
ip ssh server
Congure an SSH server.
Syntax
ip ssh server {ciphers cipher-list} {enable | port port-number} [kex key-
exchange-algorithm] [mac hmac-algorithm] [version {1 | 2}]
To disable SSH server functions, use the no ip ssh server {ciphers cipher-list} {enable |
port port-number} {kex key-exchange-algorithm command.
Parameters
enable Enter the keyword enable to start the SSH server.
ciphers cipher-list Enter the keyword ciphers and then a space-delimited list of ciphers that the SSH
server supports. The following ciphers are available.
• 3des-cbc
1170 Security