Reference Guide
Usage Information Use this command to view information about the established SSH sessions.
Example
OS10# show ip ssh
SSH Server: Enabled
--------------------------------------------------
SSH Server Ciphers: chacha20-poly1305@openssh.com,aes128-ctr,
aes192-ctr,aes256-ctr,
aes128-gcm@openssh.com,aes256-gcm@openssh.com
SSH Server MACs: umac-64-etm@openssh.com,umac-128-etm@openssh.com,
hmac-sha2-256-etm@openssh.com,hmac-sha2-512-
etm@openssh.com,
hmac-sha1-etm@openssh.com,umac-64@openssh.com,
umac-128@openssh.com,hmac-sha2-256,
hmac-sha2-512,hmac-sha1
SSH Server KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,
ecdh-sha2-nistp384,ecdh-sha2-nistp521,
diffie-hellman-group-exchange-sha256,diffie-
hellman-group14-sha1
Password Authentication: Enabled
Host-Based Authentication: Disabled
RSA Authentication: Enabled
Challenge Response Auth: Disabled
Supported Releases 10.3.0E or later
show users
Displays information for all users logged into OS10.
Syntax
show users
Parameters None
Default Not congured
Command Mode EXEC
Usage Information Use this command to view current OS10 users.
Example
OS10# show users
Index Line User Role Application Idle Location Login-Time Lock
-------------------------------------------------------------------
1 ttyS0 admin sysadmin login/clish . - 2016-04-29 01:02:00
Supported Releases 10.2.0E or later
username
Creates an authentication system based on user names.
Syntax
username username password [encryption-type password] [role role]
Parameters
• username — Enter the text string for the name of the user (up to 63 characters).
• encryption-type — (Optional) Enter the encryption type for the password in either clear-text or hashing:
• SHA512 — Store the password as clear-text (default).
• SHA256 — Encrypt the password using a DES hashing algorithm.
• MD5 — Encrypt the password using an MD5 hashing algorithm.
396 System management