Limitations; Configuring Ssh; Configuration Guidelines - Cisco Catalyst 2928 Software Configuration Manual

Ios release 12.2(55)ez
Table of Contents

Advertisement

Configuring the Switch for Secure Shell
SSH supports the Data Encryption Standard (DES) encryption algorithm, the Triple DES (3DES)
encryption algorithm, and password-based user authentication.
SSH also supports these user authentication methods:
Note
This software release does not support IP Security (IPSec).

Limitations

Configuring SSH

Configuration Guidelines

Follow these guidelines when configuring the switch as an SSH server or SSH client:
Catalyst 2928 Switch Software Configuration Guide
8-34
TACACS+ (for more information, see the
page
8-10)
RADIUS (for more information, see the
page
8-17)
Local authentication and authorization (for more information, see the
Local Authentication and Authorization" section on page
The switch supports Rivest, Shamir, and Adelman (RSA) authentication.
SSH supports only the execution-shell application.
The SSH server and the SSH client are supported only on DES (56-bit) and 3DES (168-bit) data
encryption software.
The switch does not support the Advanced Encryption Standard (AES) symmetric encryption
algorithm.
Configuration Guidelines, page 8-34
Setting Up the Switch to Run SSH, page 8-35
Configuring the SSH Server, page 8-36
server)
An RSA key pair generated by a SSHv1 server can be used by an SSHv2 server, and the reverse.
If you get CLI error messages after entering the crypto key generate rsa global configuration
command, an RSA key pair has not been generated. Reconfigure the hostname and domain, and then
enter the crypto key generate rsa command. For more information, see the
to Run SSH" section on page
When generating the RSA key pair, the message
you must configure a hostname by using the hostname global configuration command.
When generating the RSA key pair, the message
must configure an IP domain name by using the ip domain-name global configuration command.
When configuring the local authentication and authorization authentication method, make sure that
AAA is disabled on the console.
Chapter 8
"Controlling Switch Access with TACACS+" section on
"Controlling Switch Access with RADIUS" section on
(required)
(required only if you are configuring the switch as an SSH
8-35.
No host name specified
No domain specified
Configuring Switch-Based Authentication
"Configuring the Switch for
8-32)
"Setting Up the Switch
might appear. If it does,
might appear. If it does, you
OL-23389-01

Advertisement

Table of Contents
loading

Table of Contents