Configuring The Switch For Secure Shell; Understanding Ssh; Configuring Ssh - Cisco Catalyst 3750 Software Configuration Manual

Metro switch
Hide thumbs Also See for Catalyst 3750:
Table of Contents

Advertisement

Chapter 7
Configuring Switch-Based Authentication

Configuring the Switch for Secure Shell

This section describes how to configure the Secure Shell (SSH) feature. The cryptographic (that is,
supports encryption) version of the switch software must be installed on your switch. You must obtain
authorization to use this feature and to download the cryptographic software files from Cisco.com. For
more information, refer to the release notes for this release.
This section contains this configuration information:
For complete syntax and usage information for the commands used in this section, refer to the "Secure
Note
Shell Commands" section in the Cisco IOS Security Command Reference for Release 12.1.

Understanding SSH

SSH is a protocol that provides a secure, remote connection to a device. SSH provides more security for
remote connections than Telnet by providing strong encryption when a device is authenticated. The SSH
feature has an SSH server and an SSH integrated client.
This software release only supports SSH version 1.
Note
The SSH feature in this software release does not support IP Security (IPSec).
SSH supports these user authentication methods:
For more information about SSH, refer to the "Configuring Secure Shell" section in the Cisco IOS
Security Configuration Guide for Release 12.1.

Configuring SSH

Before configuring SSH, download the cryptographic version of the switch software image from
Cisco.com. For more information, refer to the release notes for this release.
For information about configuring SSH and displaying SSH settings, refer to the "Configuring Secure
Shell" section in the Cisco IOS Security Configuration Guide for Release 12.1.
78-15870-01
Understanding SSH, page 7-37
Configuring SSH, page 7-37
TACACS+ (For more information, see the
page
7-10.)
RADIUS (For more information, see the
page
7-17.)
Local authentication and authorization (For more information, see the
Local Authentication and Authorization" section on page

Configuring the Switch for Secure Shell

"Controlling Switch Access with TACACS+" section on
"Controlling Switch Access with RADIUS" section on
7-36.)
Catalyst 3750 Metro Switch Software Configuration Guide
"Configuring the Switch for
7-37

Advertisement

Table of Contents
loading

Table of Contents