Cisco Cisco Email Security Appliance C380 사용자 가이드
8-44
Cisco IronPort AsyncOS 7.6 for Email Daily Management Guide
OL-25138-01
Chapter 8 Common Administrative Tasks
Managing Secure Shell (SSH) Keys
Managing Secure Shell (SSH) Keys
The
sshconfig
command adds and deletes secure shell (SSH) public User keys to the
authorized_keys
file of user accounts that have been configured on the system, including the admin account. This allows
authentication to user accounts using SSH keys rather than password challenge. Both SSH protocol
version 1 (SSH1) and SSH protocol version 2 (SSH2) with RSA-based authentication and DSA key types
are supported. You can disable SSH1 via the
authentication to user accounts using SSH keys rather than password challenge. Both SSH protocol
version 1 (SSH1) and SSH protocol version 2 (SSH2) with RSA-based authentication and DSA key types
are supported. You can disable SSH1 via the
setup
subcommand.
Note
To configure Host keys, which are used when performing SCP pushes of log files from the Cisco IronPort
appliance to other host machines, use
appliance to other host machines, use
logconfig -> hostkeyconfig
. For more information, see
Using
hostkeyconfig
, you can scan for keys of remote hosts and add them to the Cisco IronPort
appliance.
Note
When pasting new keys directly into the CLI, type Enter or Return on a blank line to finish entering the
key.
key.
In the following example, a new public key is installed for the admin account:
mail3.example.com> systemsetup
[The system setup wizard is run.]
mail3.example.com> commit
Please enter some comments describing your changes:
[]> pasted new configuration file and changed default settings via
systemsetup
mail3.example.com> sshconfig
Currently installed keys for admin:
Choose the operation you want to perform:
- NEW - Add a new key.