Configuring Ssh - Cisco Catalyst 3560-X Software Configuration Manual

Hide thumbs Also See for Catalyst 3560-X:
Table of Contents

Advertisement

Chapter 1
Configuring Switch-Based Authentication
The switch supports an SSHv1 client.
SSH supports the Data Encryption Standard (DES) encryption algorithm, the Triple DES (3DES)
encryption algorithm, and password-based user authentication.
SSH also supports these user authentication methods:
Note
This software release does not support IP Security (IPSec).
Limitations
These limitations apply to SSH:

Configuring SSH

This section has this configuration information:
Configuration Guidelines
Follow these guidelines when configuring the switch as an SSH server or SSH client:
OL-25303-03
TACACS+ (for more information, see the
page
1-10)
RADIUS (for more information, see the
page
1-17)
Local authentication and authorization (for more information, see the
Local Authentication and Authorization" section on page
The switch supports Rivest, Shamir, and Adelman (RSA) authentication.
SSH supports only the execution-shell application.
The SSH server and the SSH client are supported only on DES (56-bit) and 3DES (168-bit) data
encryption software.
The switch supports the Advanced Encryption Standard (AES) encryption algorithm with a 128-bit
key, 192-bit key, or 256-bit key. However, symmetric cipher AES to encrypt the keys is not
supported.
Configuration Guidelines, page 1-45
Setting Up the Switch to Run SSH, page 1-46
Configuring the SSH Server, page 1-47
server)
An RSA key pair generated by a SSHv1 server can be used by an SSHv2 server, and the reverse.
If the SSH server is running on a stack master and the stack master fails, the new stack master uses
the RSA key pair generated by the previous stack master.
If you get CLI error messages after entering the crypto key generate rsa global configuration
command, an RSA key pair has not been generated. Reconfigure the hostname and domain, and then
enter the crypto key generate rsa command. For more information, see the
to Run SSH" section on page
"Controlling Switch Access with TACACS+" section on
"Controlling Switch Access with RADIUS" section on
(required)
(required only if you are configuring the switch as an SSH
1-46.
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
Configuring the Switch for Secure Shell
"Configuring the Switch for
1-43)
"Setting Up the Switch
1-45

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 3750-x

Table of Contents