ssh
To start an encrypted session with a remote system,
use the ssh command in the
EXEC mode.
ssh
[ip-address
| hostname] username port [number]
version
[1 | 2]
delete hostkey word
Syntax Description
ssh
|
The command to start an encrypted session with a
remote system.
|
ip-address
|
IP address of the remote system. Supports up to
64 alphanumeric characters.
|
hostname
|
Hostname of the remote system. Supports up to 64
alphanumeric characters.
|
username
|
Username of the user logging in through SSH.
|
port [number]
|
(Optional) Indicates the port number of the remote
host. From 0 to 65,535. Default 22.
|
version [1 | 2]
|
(Optional) Indicates the version number. Default
2.
|
delete hostkey
|
Deletes the SSH fingerprint of a specific host.
|
word
|
IPv4 address or hostname of a remote system. Supports
up to 64 alphanumeric characters.
|
Defaults
Disabled.
Command Modes
EXEC (Admin or Operator)
Usage Guidelines
The ssh command
enables a system to make a secure, encrypted connection to another remote
system or server. This connection provides functionality similar to that
of an outbound Telnet connection except that the connection is encrypted.
With authentication and encryption, the SSH client allows for secure
communication over an insecure network.
Examples
Example 1
/admin# ssh cda1 admin
admin@cda1's password:
Last login: Wed Jul 11 05:53:20 2008 from cda.cisco.com
cda1/admin#
Example 2
/admin# ssh delete host
cda
/admin#