ssh

To start an encrypted session with a remote system, use the ssh command in the EXEC mode.

ssh [ip-address | hostname] username port [number] version [1 | 2] delete hostkey word

Syntax Description

ssh

The command to start an encrypted session with a remote system.

ip-address

IP address of the remote system. Supports up to 64 alphanumeric characters.

hostname

Hostname of the remote system. Supports up to 64 alphanumeric characters.

username

Username of the user logging in through SSH.

port [number]

(Optional) Indicates the port number of the remote host. From 0 to 65,535. Default 22.

version [1 | 2]

(Optional) Indicates the version number. Default 2.

delete hostkey

Deletes the SSH fingerprint of a specific host.

word

IPv4 address or hostname of a remote system. Supports up to 64 alphanumeric characters.

Defaults

Disabled.

Command Modes

EXEC (Admin or Operator)

Usage Guidelines

The ssh command enables a system to make a secure, encrypted connection to another remote system or server. This connection provides functionality similar to that of an outbound Telnet connection except that the connection is encrypted. With authentication and encryption, the SSH client allows for secure communication over an insecure network.

Examples

Example 1

/admin# ssh cda1 admin

admin@cda1's password:

Last login: Wed Jul 11 05:53:20 2008 from cda.cisco.com

 

cda1/admin#

 

Example 2

/admin# ssh delete host cda

/admin#