Users Guide

Table Of Contents
ed25519 — Displays the Ed25519 key.
Default Not congured
Command Mode EXEC
Usage Information After you regenerate an SSH server key with a customized bit size, disable and re-enable the SSH server to use
the new public keys. To verify the changes, use the show crypto command.
If a remote SSH client uses strict host-key checking, copy a newly generated host key to the list of known hosts
on the client device.
Example
OS10# show crypto ssh-key rsa
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCogJtArA0fHJkFpioGaAcp+vrDQFC3l3XFHtd
41wXY9kM0Ar+37yRsDul8vKodqSDiGLRuPjFTcVjvDdSKWblJRsybkmA6nuHJIyPOScDepLlicM
IOxDhXEE92VRAmGuLI2AoeVYcH+IneWXhwQOkOFLtpxfnsiQY65CfS4aGoHOHWSfX3wI7boEDRD
uvZ8gzRxTuM16Qr+RxBLJ7/OzkjNIN1/8Ok+8aJtCoJKbcYaduMjmhVNrNUW5TUXoCnp1XNRpkJ
zgS7Lt47yi86rqrTCAQW4eSYJIJs4+4ql9b4MF2D3499Ofn8uS82Mjtj0Nl01lbTbP3gsF4YYdB
WaFqp root@OS10
Supported Releases 10.4.1.0 or later
show ip ssh
Displays the SSH server information.
Syntax
show ip ssh
Parameters None
Default Not congured
Command Mode EXEC
Usage Information Use this command to view information about the established SSH sessions.
Example
OS10# show ip ssh
SSH Server: Enabled
--------------------------------------------------
SSH Server Ciphers: chacha20-poly1305@openssh.com,aes128-ctr,
aes192-ctr,aes256-ctr,
aes128-gcm@openssh.com,aes256-gcm@openssh.com
SSH Server MACs: umac-64-etm@openssh.com,umac-128-etm@openssh.com,
hmac-sha2-256-etm@openssh.com,
hmac-sha2-512-etm@openssh.com,
hmac-sha1-etm@openssh.com,umac-64@openssh.com,
umac-128@openssh.com,hmac-sha2-256,
hmac-sha2-512,hmac-sha1
SSH Server KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,
ecdh-sha2-nistp384,ecdh-sha2-nistp521,
diffie-hellman-group-exchange-sha256,
diffie-hellman-group14-sha1
Password Authentication: Enabled
Host-Based Authentication: Disabled
RSA Authentication: Enabled
Challenge Response Auth: Disabled
Supported Releases 10.3.0E or later
Security 965