Connectivity Guide

Table Of Contents
Usage
Information
To display the contents of the audit log, use the show logging audit command.
Example
OS10# clear logging audit
Proceed to clear all audit log messages [confirm yes/no(default)]:yes
Supported
Releases
10.4.3.0 or later
crypto ssh-key generate
Regenerate public keys used in SSH authentication.
Syntax
crypto ssh-key generate {rsa bits | ecdsa bits | ed25519}
Parameters
rsa bits Regenerates the RSA key with the specified bit size (2048, 3072, or 4096; default
2048).
ecdsa bits Regenerates the ECDSA key with the specified bit size (256, 384, or 521; default
256).
ed25519 Regenerates the Ed25519 key with the default bit size.
Default The SSH server uses default public key lengths for client authentication:
RSA key: 2048 bits
ECDSA key : 256 bits
Ed25519 key: 256 bits
Command Mode EXEC
Usage
Information
If necessary, you can regenerate the public keys used by the SSH server with a customized bit size. You
cannot change the default size of the Ed25519 key. The crypto ssh-key generate command is
available only to the sysadmin and secadmin roles.
Example
OS10# crypto ssh-key generate rsa 4096
Host key already exists. Overwrite [confirm yes/no]:yes
Generated 4096-bit RSA key
OS10#
Supported
Releases
10.4.1.0 or later
disable
Lowers the privilege level.
Syntax
disable privilege-level
Parameters
privilege-levelEnter the privilege level, from 0 to 15.
Defaults 1
Command Mode Privileged EXEC
Usage
Information
If you do not specify a privilege level, the system assigns level 1.
Example
OS10# disable
OS10# disable 6
Supported
Releases
10.4.3.0 or later
768 Security