Specifications
16-18
Cisco Unity Express Voice-Mail and Auto-Attendant CLI Administrator Guide for 3.0 and Later Versions
OL-14010-09
Chapter 16 Backing Up and Restoring Data
Encrypting and Signing of Backup Content on the Server
4. show security ssh knowhost
DETAILED STEPS
Encrypting and Signing of Backup Content on the Server 
This section discusses the following topics:
  • Overview, page 18
  • Configuring the Encryption and Signing of Backup Content on the Server, page 19
Overview
Starting in release 3.0, you can protect backed up configuration and data files using signing and 
encryption before the files are transferred to the backup server.
To enable this feature, you must configure a master key, from which the encryption and signing key 
(known as the session key) are derived. The backup files are encrypted and signed before they are sent 
to the backup server. When you restore the files, the master key is used to validate the integrity of the 
files and decrypt them accordingly. You can also restore the backup files to any other machine running 
Command or Action Purpose
Step 1
config t
Example:
se-10-0-0-0# config t
Enters configuration mode.
Step 2
security ssh knownhost host {ssh-rsa | ssh-dsa} 
fingerprint-string
Example:
se-10-0-0-0(config)# security ssh knownhost 
server.cisco.com ssh-rsa 
a5:3a:12:6d:e9:48:a3:34:be:8f:ee:50:30:e5:e6:c3
Configures the MD5 fingerprint of the SSH server’s 
host key using the following arguments and 
keywords:
host — Fully qualified hostname or IP address of the 
SSH server.
ssh-rsa — RSA algorithm was used to create this 
fingerprint for a SSH server’s host key.
ssh-dsa — DSA algorithm was used to create this 
fingerprint for a SSH server’s host key.
fingerprint-string — MD5 fingerprint string.
Step 3
end
Example:
se-10-0-0-0(config)# end
Returns to privileged EXEC mode.
Step 4
show security ssh knownhost
Example:
se-10-0-0-0(config)# show security ssh knownhost
Displays a list of configured SSH servers and their 
fingerprints.










