Service Manual

Table Of Contents
SSH and SCP Commands
Dell Networking OS supports secure shell (SSH) protocol versions 1.5 and 2.0. SSH is a protocol for secure remote login over an
insecure network. SSH sessions are encrypted and use authentication.
crypto key generate
Generate keys for the SSH server.
Syntax
NOTE: Some of the parameters in this command require licensing to access. For more information,
contact your Dell Networking representative.
crypto key generate {rsa | rsa1}
Parameters
rsa Enter the keyword rsa then the key size to generate a SSHv2 RSA host keys. The
range is from 1024 to 2048 if you did not enable FIPS mode; if you enabled FIPS
mode, you can only generate a 2048-bit key. The default is 1024.
NOTE: You must have a license to access the FIPS mode. For more
information, contact your Dell Networking representative.
rsa1 Enter the keyword rsa1 then the key size to generate a SSHv1 RSA host keys.
The range is from 1024 to 2048. The default is 1024.
NOTE: This option is not available in FIPS mode.
Defaults Key size 1024; if you enable FIPS mode, the key size is 2048.
Command Modes CONFIGURATION
Command
History
This guide is platform-specific. For command information about other platforms, see the relevant Dell
Networking OS Command Line Reference Guide.
Version Description
9.8(1.0) Introduced on the Z9100-ON.
9.8(0.0P5) Introduced on the S4048-ON.
9.8(0.0P2) Introduced on the S3048-ON.
9.7(0.0) Introduced on the S6000-ON.
9.2(1.0) Introduced on the Z9500.
9.0.2.0 Introduced on the S6000.
8.3.19.0 Introduced on the S4820T.
8.3.11.1 Introduced on the Z9000.
8.3.12.0 Added support for FIPS mode on the S4810.
8.3.7.0 Introduced on the S4810.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
pre-6.1.1.0 Introduced on the E-Series.
Usage
Information
The host keys are required for key-exchange by the SSH server. If the keys are not found when you
enable the server (ip ssh server enable), the keys are automatically generated.
This command requires user interaction and generates a prompt prior to overwriting any existing host
keys.
NOTE: Only a user with superuser permissions should generate host-keys.
1278 Security