{"provider_url":"https://hatena.blog","title":"Cisco SSH Configuration","description":"\u7279\u6a29\u30d1\u30b9\u30ef\u30fc\u30c9\u306e\u8a2d\u5b9a enable secret [PW] \u30ed\u30fc\u30ab\u30eb\u30e6\u30fc\u30b6\u306e\u4f5c\u6210 username [USERNAME] password [PW] \u30db\u30b9\u30c8\u540d\u306e\u8a2d\u5b9a hostname [HOSTNAME] \u30c9\u30e1\u30a4\u30f3\u540d\u306e\u8a2d\u5b9a ip domain-name [DOMAIN-NAME] SSH\u306eRSA\u6697\u53f7\u5316\u9375\u3092\u751f\u6210 (\u9375\u9577\u30b5\u30a4\u30ba\u306f768\u4ee5\u4e0a\u3067\u306a\u3044\u3068SSHv2\u6307\u5b9a\u304c\u51fa\u6765\u306a\u3044\u306e\u3067\u6ce8\u610f) crypto key generate rsa SSH\u30d0\u30fc\u30b8\u30e7\u30f3\u306e\u6307\u5b9a (\u4eca\u56de\u306fv2\u3092\u6307\u5b9a) ip ssh version 2 \u30ea\u30e2\u30fc\u30c8\u63a5\u7d9a\u306bSSH\u3092\u4f7f\u7528\u3059\u308b\u3088\u3046\u306b\u6307\u5b9a line vty 0 4 transport in\u2026","url":"https://ictdiary.hatenadiary.jp/entry/2024/10/22/045750","height":"190","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fictdiary.hatenadiary.jp%2Fentry%2F2024%2F10%2F22%2F045750\" title=\"Cisco SSH Configuration - ICT Diary\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","author_name":"ictdiary","blog_title":"ICT Diary","version":"1.0","type":"rich","provider_name":"Hatena Blog","categories":["Network"],"image_url":null,"published":"2024-10-22 04:57:50","blog_url":"https://ictdiary.hatenadiary.jp/","width":"100%","author_url":"https://blog.hatena.ne.jp/ictdiary/"}