EasyManua.ls Logo

Cisco CSACS-1121-K9 - Ssh

Cisco CSACS-1121-K9
190 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
A-51
CLI Reference Guide for the Cisco Secure Access Control System 5.1
OL-18996-01
Appendix A ACS Command Reference
EXEC Commands
ssh
To start an encrypted session with a remote system, use the ssh command in the EXEC mode.
Note An Admin or Operator (user) can use this command (see Table 1-1).
ssh [ip-address | hostname] username port [number] version [1 | 2] delete hostkey word
Syntax Description
Defaults Disabled.
Command Modes EXEC (Admin or Operator)
Usage Guidelines The ssh command enables a system to make a secure, encrypted connection to another remote system or
server. This connection provides functionality similar to that of an outbound Telnet connection except
that the connection is encrypted. With authentication and encryption, the SSH client allows for secure
communication over an insecure network.
Examples Example 1
acs/admin# ssh delete hostkey mtm-sun8
acs/admin#
Example 2
acs/admin# ssh acs2 admin
admin@acs2's password:
Last login: Wed Jul 11 05:53:20 2008 from ACS.cisco.com
acs2/admin#
ip-address IP address of the remote system. Up to 64 alphanumeric characters.
hostname Hostname of the remote system. Up to 64 alphanumeric characters.
username Username of the user logging in through SSH.
port [number] (Optional) Indicates the port number of the remote host. From 0 to 65,535.
Default 22.
version [1 | 2] (Optional) Indicates the version number. Default 2.
delete hostkey Deletes the SSH fingerprint of a specific host.
word IPv4 address or hostname of a remote system. Up to 64 alphanumeric
characters.

Table of Contents

Related product manuals