Connectivity Guide

Table Of Contents
aaa authentication login default group radius local
aaa authentication login console local
OS10(config)# no aaa authentication login default
OS10(config)# do show running-configuration aaa
aaa authentication login default local
aaa authentication login console local
Supported Releases 10.4.1.0 or later
aaa re-authenticate enable
Requires user re-authentication after a change in the authentication method or server.
Syntax
aaa re-authenticate enable
Parameters None
Default Disabled
Command Mode EXEC
Usage Information
After you enable user re-authentication and change the authentication method or server, users are logged out
of the switch and are prompted to log in again to re-authenticate. User re-authentication is triggered by:
Adding or removing a RADIUS server as a congured server host with the radius-server host
command.
Adding or removing an authentication method with the aaa authentication [local | radius]
command.
The no version of the command disables user re-authentication.
Example
OS10(config)# aaa re-authenticate enable
Supported Releases 10.4.0E(R1) or later
crypto ssh-key generate
Regenerate public keys used in SSH authentication.
Syntax
crypto ssh-key generate {rsa bits | ecdsa bits | ed25519}
Parameters
rsa bits — Regenerates the RSA key with the specied bit size (2048, 3072, or 4096; default 2048).
ecdsa bits — Regenerates the ECDSA key with the specied bit size (256, 384, or 521; default 256).
ed25519 — Regenerates the Ed25519 key with the default bit size.
Default The SSH server uses default public key lengths for client authentication:
RSA key: 2048 bits
ECDSA key : 256 bits
Ed25519 key: 256 bits
Command Mode EXEC
Usage Information If necessary, you can regenerate the public keys used by the SSH server with a customized bit size. You cannot
change the default size of the Ed25519 key. The crypto ssh-key generate command is available only to the
sysadmin and secadmin roles.
System management 623