Difference between revisions of "Show ip ssh"
Jump to navigation
Jump to search
Line 6: | Line 6: | ||
Hostkey Algorithms:x509v3-ssh-rsa,ssh-rsa | Hostkey Algorithms:x509v3-ssh-rsa,ssh-rsa | ||
Encryption Algorithms:aes128-ctr,aes192-ctr,aes256-ctr | Encryption Algorithms:aes128-ctr,aes192-ctr,aes256-ctr | ||
− | MAC Algorithms:hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96 | + | [[MAC Algorithms]]:hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96 |
KEX Algorithms:diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1 | KEX Algorithms:diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1 | ||
Authentication timeout: 120 secs; Authentication retries: 3 | Authentication timeout: 120 secs; Authentication retries: 3 | ||
Line 13: | Line 13: | ||
Modulus Size : 2048 bits | Modulus Size : 2048 bits | ||
ssh-rsa AAAAB3NzaC1yc2EAAssDAQABAgAABQCY5vynl5Iyl+t6b21sNrPyh9uwlbny1wcwo4ubkhat | ssh-rsa AAAAB3NzaC1yc2EAAssDAQABAgAABQCY5vynl5Iyl+t6b21sNrPyh9uwlbny1wcwo4ubkhat | ||
− | quxmLES/IToPL4S01n7ZmaEMQdLmkJ2RQYdc6gmCVULC3n7iKY3FW+rWNXoe+5/plEdcVC8LMLaorWoj | + | quxmLES/IToPL4S01n7ZmaEMQdLmkJ2RQYdc6gmCVULC3n7iKY3FW+rWNXoe+5/plEdcVC8LMLaorWoj |
− | Um0v+unHPdvcXVKa7a+QUkUVLQGm6NGzXXGG8JHHoRQBmhmFmmPpeWpjR868nkPxG5dXNcwHvIjbD9sR | + | Um0v+unHPdvcXVKa7a+QUkUVLQGm6NGzXXGG8JHHoRQBmhmFmmPpeWpjR868nkPxG5dXNcwHvIjbD9sR |
− | z+cyYLpfSZ6RPm52G9SGDI9YcI1sbC1t4SkRsEsbNgvJzmj3RSlEL0nWIxafLQECPaA6ctKQtKjpI/ur | + | z+cyYLpfSZ6RPm52G9SGDI9YcI1sbC1t4SkRsEsbNgvJzmj3RSlEL0nWIxafLQECPaA6ctKQtKjpI/ur |
− | tJNnYUXY5kO6MT/1lrObBdCyxdx+xR9aMv/xtovlstn39XUnvlO0EUhJkv66 | + | tJNnYUXY5kO6MT/1lrObBdCyxdx+xR9aMv/xtovlstn39XUnvlO0EUhJkv66 |
== Activities == | == Activities == |
Revision as of 13:42, 9 December 2020
show ip ssh SSH Enabled - version 2.0 Authentication methods:publickey,keyboard-interactive,password Authentication Publickey Algorithms:x509v3-ssh-rsa,ssh-rsa Hostkey Algorithms:x509v3-ssh-rsa,ssh-rsa Encryption Algorithms:aes128-ctr,aes192-ctr,aes256-ctr MAC Algorithms:hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96 KEX Algorithms:diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1 Authentication timeout: 120 secs; Authentication retries: 3 Minimum expected Diffie Hellman key size : 2048 bits IOS Keys in SECSH format(ssh-rsa, base64 encoded): TP-self-signed-1692485518 Modulus Size : 2048 bits ssh-rsa AAAAB3NzaC1yc2EAAssDAQABAgAABQCY5vynl5Iyl+t6b21sNrPyh9uwlbny1wcwo4ubkhat quxmLES/IToPL4S01n7ZmaEMQdLmkJ2RQYdc6gmCVULC3n7iKY3FW+rWNXoe+5/plEdcVC8LMLaorWoj Um0v+unHPdvcXVKa7a+QUkUVLQGm6NGzXXGG8JHHoRQBmhmFmmPpeWpjR868nkPxG5dXNcwHvIjbD9sR z+cyYLpfSZ6RPm52G9SGDI9YcI1sbC1t4SkRsEsbNgvJzmj3RSlEL0nWIxafLQECPaA6ctKQtKjpI/ur tJNnYUXY5kO6MT/1lrObBdCyxdx+xR9aMv/xtovlstn39XUnvlO0EUhJkv66
Activities
- Execute
show ip ssh
on your router. Compare output with example and understand output. - Configure public RSA key authentication
See also
show ssh
,show ip ssh
, Cisco IOS/Configure public RSA key authentication,transport input ssh
,ip ssh pubkey-chain
,crypto key generate rsa
,show crypto key mypubkey rsa
,crypto key zeroize rsa
Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Source: https://en.wikiversity.org/wiki/Cisco_IOS/show_ip_ssh
Advertising: