Configuration Commands 83
Table 76 Syslog Configuration commands
Command Description
[no] logging log {<feature>}
Displays a list of features for which syslog messages can be
generated. You can choose to enable/disable specific
features or enable/disable syslog on all available features.
Features include:
• console
• system
• mgmt
• cli
• stg
• vlan
• ssh
• ntp
• ip
• web
• rmon
• ufd
Command mode: Global configuration
show logging
Displays the current syslog settings.
Command mode: All
Secure Shell Server configuration
Telnet traffic on the network is not secure. These commands enable Secure Shell (SSH) access from any SSH client.
The SSH program securely logs into another computer over a network and executes commands in a secure
environment. All data using SSH is encrypted.
Secure Shell can be configured on the switch using the console port only. The commands are not available if you
access the switch using Telnet or the Browser-based Interface (BBI).
NOTE: See the HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Application Guide for information on
SSH.
The following table describes the SSHD Configuration commands.
Table 77 SSHD Configuration commands
Command Description
ssh interval <0-24>
Defines interval for auto-generating the RSA server key. The switch will auto-
generate the RSA server key at the interval defined in this command. The range is 0-
24 hours.
The value of zero (0) means the RSA server key auto-generation is disabled. If the
switch has been busy performing any other key generation and the assigned time of
interval expires, the RSA server will skip generating the key.
Command mode: Global configuration
ssh scp-password
Defines the administrator password that is for Secure Copy (SCP) only. The
username for this SCP administrator is scpadmin.
Typically, SCP is used to copy files securely from one machine to another. In the
switch, SCP is used to download and upload the switch configuration using secure
channels.
Command mode: Global configuration
ssh generate-host-key
Generates the RSA host keys manually. The switch creates this key automatically
while configuring the switch with Secure Shell (SSH). But you can generate the key
manually by using this command if you need to overwrite the key for security
reasons. The command will take effect immediately.
Command mode: Global configuration