1-23When logging into the SSH server using public key authentication, an SSH client needs to read its localprivate key for authentication. As two algorithms (RSA or DSA) are available, the identity-key keywordmust be used to specify one algorithm in order to get the correct private key.Displaying and Maintaining SSH ConfigurationTo do... Use the command... RemarksDisplay the public keyinformation of the currentswitch’s key pairsdisplay public-key local { dsa | rsa }publicDisplay information aboutlocally saved public keys ofSSH peersdisplay public-key peer [ brief | namepubkey-name ]Display information about SSHstatus and about sessions ofactive connections with SSHclientsdisplay ssh server { session | status }Display information about allSSH usersdisplay ssh user-information[ username ]Display the current source IPaddress or the IP address ofthe source interface specifiedfor the SSH server.display ssh-server source-ipDisplay the mappings betweenhost public keys and SSHservers saved on a clientdisplay ssh server-infoDisplay the current source IPaddress or the IP address ofthe source interface specifiedfor the SSH Client.display ssh2 source-ipAvailable in any viewComparison of SSH Commands with the Same FunctionsAfter the SSH protocol supports the DSA asymmetric key algorithm, some SSH configurationcommands are changed. For the sake of SSH configuration compatibility, the original commands arestill supported. Table 1-18 lists both the original commands and current commands.Table 1-18 List of SSH configuration commands with the same functionsOperation Original commands Current commandsDisplay local RSA publickeys display rsa local-key-pair public display public-key local rsapublicDisplay information aboutthe peer RSA public keysdisplay rsa peer-public-key[ brief | name keyname ]display public-key peer [ brief |name pubkey-name ]