Reference Guide

Table Of Contents
aaa authentication login default group radius local
aaa authentication login console local
OS10(config)# no aaa authentication login default
OS10(config)# do show running-configuration aaa
aaa authentication login default local
aaa authentication login console local
Supported
Releases
10.4.1.0 or later
aaa re-authenticate enable
Requires user re-authentication after a change in the authentication method or server.
Syntax
aaa re-authenticate enable
Parameters None
Default Disabled
Command Mode EXEC
Usage
Information
After you enable user re-authentication and change the authentication method or server, users are
logged out of the switch and are prompted to log in again to re-authenticate. User re-authentication is
triggered by:
Adding or removing a RADIUS server as a configured server host (radius-server host
command)
Adding or removing an authentication method (aaa authentication [local | radius]
command)
The no version of the command disables user re-authentication.
Example
OS10(config)# aaa re-authenticate enable
Supported
Releases
10.4.0E(R1) or later
crypto ssh-key generate
Regenerate public keys used in SSH authentication.
Syntax
crypto ssh-key generate {rsa bits | ecdsa bits | ed25519}
Parameters
rsa bits Regenerates the RSA key with the specified bit size (2048, 3072, or 4096; default
2048).
ecdsa bits Regenerates the ECDSA key with the specified bit size (256, 384, or 521; default
256).
ed25519 Regenerates the Ed25519 key with the default bit size.
Default The SSH server uses default public key lengths for client authentication:
RSA key: 2048 bits
ECDSA key : 256 bits
Ed25519 key: 256 bits
Command Mode EXEC
Usage
Information
If necessary, you can regenerate the public keys used by the SSH server with a customized bit size. You
cannot change the default size of the Ed25519 key. The crypto ssh-key generate command is
available only to the sysadmin and secadmin roles.
Example
OS10# crypto ssh-key generate rsa 4096
Host key already exists. Overwrite [confirm yes/no]:yes
500 System management