Security Command Reference
152 7705 SAR OS System Management Guide
Number of SSH sessions : 1
Sample Output (IPv6)
*A:7705:Dut-C> # show system security ssh
===============================================================================
SSH Server
===============================================================================
Administrative State : Enabled
Operational State : Up
Preserve Key : Disabled
SSH Protocol Version 1 : Disabled
SSH Protocol Version 2 : Enabled
DSA Host Key Fingerprint : bd:fe:f5:fc:15:9d:86:65:f5:63:02:d5:55:16:d1:50
RSA Host Key Fingerprint : 00:d6:b3:83:41:2f:50:ea:63:ef:5d:71:30:ef:93:ad
-------------------------------------------------------------------------------
Connection Username Version ServerName Status
-------------------------------------------------------------------------------
3301::xxxx:xxxx admin 2 cli connected
-------------------------------------------------------------------------------
Number of SSH sessions : 1
Table 15: Show SSH Output Fields
Label Description
Administrative State The administrative state of the SSH server: enabled or disabled
Operational State The operational state of the SSH server: up or down
Preserve Key Enabled: preserve-key is enabled
Disabled: preserve-key is disabled
SSH Protocol Version 1 Enabled: SSH1 is enabled
Disabled: SSH1 is disabled
SSH Protocol Version 2 Enabled: SSH2 is enabled
Disabled: SSH2 is disabled
DSA Host Key Fingerprint
RSA Host Key Fingerprint
The key fingerprint is the digital signal algorithm (DSA) or
Rivest, Shamir, and Adleman (RSA) host server’s identity.
Clients trying to connect to the server verify the server’s
fingerprint. If the server fingerprint is not known, the client may
not continue with the SSH session since the server might be
spoofed.
Connection The IP address of the connected routers (remote client)
Username The name of the user