Cisco Cisco Email Security Appliance C390 사용자 가이드
Chapter 8 Common Administrative Tasks
Managing Secure Shell (SSH) Keys
8-346
Cisco IronPort AsyncOS 7.3 for Email Daily Management Guide
OL-23080-01
Managing Secure Shell (SSH) Keys
The
sshconfig
command adds and deletes secure shell (SSH) public User keys to
the authorized_keys file of user accounts that have been configured on the system,
including the admin account. This allows authentication to user accounts using
SSH keys rather than password challenge. Both SSH protocol version 1 (SSH1)
and SSH protocol version 2 (SSH2) with RSA-based authentication and DSA key
types are supported. You can disable SSH1 via the
including the admin account. This allows authentication to user accounts using
SSH keys rather than password challenge. Both SSH protocol version 1 (SSH1)
and SSH protocol version 2 (SSH2) with RSA-based authentication and DSA key
types are supported. You can disable SSH1 via the
setup
subcommand.
Note
To configure Host keys, which are used when performing SCP pushes of log files
from the Cisco IronPort appliance to other host machines, use
from the Cisco IronPort appliance to other host machines, use
logconfig ->
hostkeyconfig
. For more information, see
Using
hostkeyconfig
, you can scan for keys of remote hosts and add them to the
Cisco IronPort appliance.
Be sure to run "commit" to make these settings active.
mail3.example.com> systemsetup
[The system setup wizard is run.]
mail3.example.com> commit
Please enter some comments describing your changes:
[]> pasted new configuration file and changed default settings via
systemsetup