Reference Guide

Usage Information Use this command to view information about the established SSH sessions.
Example
OS10# show ip ssh
SSH Server: Enabled
--------------------------------------------------
SSH Server Ciphers: chacha20-poly1305@openssh.com,aes128-ctr,
aes192-ctr,aes256-ctr,
aes128-gcm@openssh.com,aes256-gcm@openssh.com
SSH Server MACs: umac-64-etm@openssh.com,umac-128-etm@openssh.com,
hmac-sha2-256-etm@openssh.com,hmac-sha2-512-
etm@openssh.com,
hmac-sha1-etm@openssh.com,umac-64@openssh.com,
umac-128@openssh.com,hmac-sha2-256,
hmac-sha2-512,hmac-sha1
SSH Server KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,
ecdh-sha2-nistp384,ecdh-sha2-nistp521,
diffie-hellman-group-exchange-sha256,diffie-
hellman-group14-sha1
Password Authentication: Enabled
Host-Based Authentication: Disabled
RSA Authentication: Enabled
Challenge Response Auth: Disabled
Supported Releases 10.3.0E or later
show users
Displays information for all users logged into OS10.
Syntax
show users
Parameters None
Default Not congured
Command Mode EXEC
Usage Information Use this command to view current OS10 users.
Example
OS10# show users
Index Line User Role Application Idle Location Login-Time Lock
-------------------------------------------------------------------
1 ttyS0 admin sysadmin login/clish . - 2016-04-29 01:02:00
Supported Releases 10.2.0E or later
username
Creates an authentication system based on user names.
Syntax
username username password [encryption-type password] [role role]
Parameters
username — Enter the text string for the name of the user (up to 63 characters).
encryption-type — (Optional) Enter the encryption type for the password in either clear-text or hashing:
SHA512 — Store the password as clear-text (default).
SHA256 — Encrypt the password using a DES hashing algorithm.
MD5 — Encrypt the password using an MD5 hashing algorithm.
396 System management