CLI Reference Guide-R01

Table Of Contents
Chapter 8
| Authentication Commands
Secure Shell
– 257 –
Some SSH client programs automatically add the public key to the known hosts
file as part of the configuration process. Otherwise, you must manually create a
known hosts file and place the host public key in it.
The SSH server uses this host key to negotiate a session key and encryption
method with the client trying to connect to it.
Example
Console#ip ssh crypto host-key generate
Console#
Related Commands
ip ssh crypto zeroize (257)
ip ssh save host-key (258)
ip ssh crypto zeroize This command clears the host key from memory (i.e. RAM).
Syntax
ip ssh crypto zeroize
Default Setting
Clears the RSA key.
Command Mode
Privileged Exec
Command Usage
This command clears the host key from volatile memory (RAM). Use the no ip
ssh save host-key command to clear the host key from flash memory.
The SSH server must be disabled before you can execute this command.
Example
Console#ip ssh crypto zeroize
Console#
Related Commands
ip ssh crypto host-key generate (256)
ip ssh save host-key (258)
no ip ssh server (254)