White Papers

Table Of Contents
ip ssh rsa-authentication (EXEC)
Add keys for the RSA authentication.
Syntax
ip ssh rsa-authentication {my-authorized-keys WORD}
To delete the authorized keys, use the no ip ssh rsa-authentication {my-authorized-
keys} command.
Parameters
my-authorized-
keys
WORD
Enter the keywords my-authorized-keys then the filename of the RSA
authorized-keys.
Defaults none
Command Modes EXEC
Supported Modes FullSwitch
Command
History
Version Description
9.9(0.0) Introduced on the FN IOM.
8.3.16.1 Introduced on the MXL 10/40GbE Switch IO Module.
Usage
Information
If you want to log in without being prompted for a password, log in through RSA authentication. To do
that, first add the SSHv2 RSA public keys to the list of authorized keys. This command adds the specified
RSA keys to the following file: flash://ADMIN_DIR/ssh/authorized-keys-username (where
username is the user associated with this terminal).
NOTE: The no form of this command deletes the file flash://ADMIN_DIR/ssh/ authorized-
keys-username file.
Related
Commands
show ip ssh rsa-authentication displays the RSA authorized keys.
ip ssh rsa-authentication (Config) enables RSA authentication.
ip ssh server
Configure an SSH server.
Syntax
ip ssh server {ciphers cipher-list} {enable | port port-number} [kex key-
exchange-algorithm] [mac hmac-algorithm] [version {1 | 2}]
To disable SSH server functions, use the no ip ssh server {ciphers cipher-list} {enable
| port port-number} {kex key-exchange-algorithm command.
Parameters
enable Enter the keyword enable to start the SSH server.
ciphers
cipher-
list
Enter the keyword ciphers and then a space-delimited list of ciphers that the
SSH server supports. The following ciphers are available.
3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
aes128-ctr
aes192-ctr
aes256-ctr
The default cipher list is used.
Security 1053