Cisco Cisco Email Security Appliance C650 Guía Del Usuario
30-27
Cisco AsyncOS 8.5 for Email User Guide
Chapter 30 Distributing Administrative Tasks
Managing Secure Shell (SSH) Keys
Figure 30-4
Web UI Login Screen with Banner
Managing Secure Shell (SSH) Keys
The
sshconfig
command adds and deletes secure shell (SSH) public User keys to the
authorized_keys
file of user accounts that have been configured on the system, including the admin account. This allows
authentication to user accounts using SSH keys rather than password challenge. Both SSH protocol
version 1 (SSH1) and SSH protocol version 2 (SSH2) with RSA-based authentication and DSA key types
are supported. You can disable SSH1 via the
authentication to user accounts using SSH keys rather than password challenge. Both SSH protocol
version 1 (SSH1) and SSH protocol version 2 (SSH2) with RSA-based authentication and DSA key types
are supported. You can disable SSH1 via the
setup
subcommand.
Note
To configure Host keys, which are used when performing SCP pushes of log files from the Cisco
appliance to other host machines, use
appliance to other host machines, use
logconfig -> hostkeyconfig
. For more information, see
Using
hostkeyconfig
, you can scan for keys of remote hosts and add them to the Cisco appliance.
Note
When pasting new keys directly into the CLI, type Enter or Return on a blank line to finish entering the
key.
key.
In the following example, a new public key is installed for the admin account:
mail3.example.com> sshconfig
Currently installed keys for admin:
Choose the operation you want to perform:
- NEW - Add a new key.
- USER - Switch to a different user to edit.
- SETUP - Configure general settings.
[]> new
Please enter the public SSH key for authorization.
Press enter on a blank line to finish.