Users Guide

crypto key generate...............................................................................................................................................1389
crypto key zeroize rsa........................................................................................................................................... 1390
debug ip ssh............................................................................................................................................................1390
ip scp topdir.............................................................................................................................................................1391
ip ssh authentication-retries................................................................................................................................. 1392
ip ssh challenge–response–authentication.........................................................................................................1393
ip ssh cipher............................................................................................................................................................1393
ip ssh connection-rate-limit.................................................................................................................................. 1394
ip ssh hostbased-authentication..........................................................................................................................1395
ip ssh key-size........................................................................................................................................................ 1396
ip ssh mac................................................................................................................................................................1397
ip ssh password-authentication........................................................................................................................... 1398
ip ssh rekey ............................................................................................................................................................ 1399
ip ssh pub-key-file..................................................................................................................................................1399
ip ssh rhostsfile.......................................................................................................................................................1400
ip ssh rsa-authentication (Config)........................................................................................................................1401
ip ssh server............................................................................................................................................................1402
ip ssh server vrf......................................................................................................................................................1405
ip ssh source-interface..........................................................................................................................................1406
ip ssh vrf..................................................................................................................................................................1407
show crypto............................................................................................................................................................ 1407
show ip ssh............................................................................................................................................................. 1409
show ip ssh client-pub-keys.................................................................................................................................. 1410
show ip ssh rsa-authentication.............................................................................................................................. 1411
ssh.............................................................................................................................................................................1412
Secure DHCP Commands............................................................................................................................................1414
clear ip dhcp snooping............................................................................................................................................1414
ip dhcp relay............................................................................................................................................................ 1415
ip dhcp snooping.....................................................................................................................................................1415
ip dhcp snooping binding........................................................................................................................................1416
ip dhcp snooping database renew........................................................................................................................ 1417
ip dhcp snooping trust............................................................................................................................................1418
ip dhcp source-address-validation........................................................................................................................1418
ip dhcp snooping vlan.............................................................................................................................................1419
show ip dhcp snooping..........................................................................................................................................1420
Role-Based Access Control Commands................................................................................................................... 1420
aaa authorization role-only.....................................................................................................................................1421
role........................................................................................................................................................................... 1422
show role.................................................................................................................................................................1423
show userroles........................................................................................................................................................1424
userrole....................................................................................................................................................................1424
ICMP Vulnerabilities.....................................................................................................................................................1426
drop icmp.................................................................................................................................................................1427
47 Service Provider Bridging.......................................................................................................................1428
debug protocol-tunnel.................................................................................................................................................1428
32
Contents