A-51
CLI Reference Guide for the Cisco Secure Access Control System 5.1
OL-18996-01
Appendix A ACS Command Reference
EXEC Commands
ssh
To start an encrypted session with a remote system, use the ssh command in the EXEC mode.
Note An Admin or Operator (user) can use this command (see Table 1-1).
ssh [ip-address | hostname] username port [number] version [1 | 2] delete hostkey word
Syntax Description
Defaults Disabled.
Command Modes EXEC (Admin or Operator)
Usage Guidelines The ssh command enables a system to make a secure, encrypted connection to another remote system or
server. This connection provides functionality similar to that of an outbound Telnet connection except
that the connection is encrypted. With authentication and encryption, the SSH client allows for secure
communication over an insecure network.
Examples Example 1
acs/admin# ssh delete hostkey mtm-sun8
acs/admin#
Example 2
acs/admin# ssh acs2 admin
admin@acs2's password:
Last login: Wed Jul 11 05:53:20 2008 from ACS.cisco.com
acs2/admin#
ip-address IP address of the remote system. Up to 64 alphanumeric characters.
hostname Hostname of the remote system. Up to 64 alphanumeric characters.
username Username of the user logging in through SSH.
port [number] (Optional) Indicates the port number of the remote host. From 0 to 65,535.
Default 22.
version [1 | 2] (Optional) Indicates the version number. Default 2.
delete hostkey Deletes the SSH fingerprint of a specific host.
word IPv4 address or hostname of a remote system. Up to 64 alphanumeric
characters.