Understanding Ssh; Ssh Servers, Integrated Clients, And Supported Versions - Cisco WS-CBS3032-DEL Software Configuration Manual

Software guide
Table of Contents

Advertisement

Configuring the Switch for Secure Shell
For SSH configuration examples, see the "SSH Configuration Examples" section in the "Configuring
Secure Shell" chapter of the Cisco IOS Security Configuration Guide, Cisco IOS Release 12.2.
SSH in IPv6 functions the same and offers the same benefits as SSH in IPv4. IPv6 enhancements to SSH
consist of support for IPv6 addresses that enable a Cisco router to accept and establish secure, encrypted
connections with remote IPv6 nodes over an IPv6 transport.

Understanding SSH

SSH is a protocol that provides a secure, remote connection to a device. SSH provides more security for
remote connections than Telnet does by providing strong encryption when a device is authenticated. This
software release supports SSH Version 1 (SSHv1) and SSH Version 2 (SSHv2).
This section consists of these topics:
The SSH connection to the stack can be lost if a stack master running the cryptographic software image
Note
and the IP base or the IP services feature set fails and is replaced by a switch that is running a
noncryptographic image and the same feature set. We recommend that a switch running the
cryptographic software image and the IP base or IP services feature set be the stack master. Encryption
features are unavailable if the stack master is running the noncryptographic software image and the
feature set.

SSH Servers, Integrated Clients, and Supported Versions

The SSH feature has an SSH server and an SSH integrated client, which are applications that run on the
switch. You can use an SSH client to connect to a switch running the SSH server. The SSH server works
with the SSH client supported in this release and with non-Cisco SSH clients. The SSH client also works
with the SSH server supported in this release and with non-Cisco SSH servers.
The switch supports an SSHv1 or an SSHv2 server.
The switch supports an SSHv1 client.
SSH supports the Data Encryption Standard (DES) encryption algorithm, the Triple DES (3DES)
encryption algorithm, and password-based user authentication.
SSH also supports these user authentication methods:
Note
This software release does not support IP Security (IPSec).
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
6-46
Configuring SSH, page 6-47
Displaying the SSH Configuration and Status, page 6-49
SSH Servers, Integrated Clients, and Supported Versions, page 6-46
Limitations, page 6-47
TACACS+ (for more information, see the
page
6-10)
RADIUS (for more information, see the
page
6-18)
Local authentication and authorization (for more information, see the
Local Authentication and Authorization" section on page
Chapter 6
Configuring Switch-Based Authentication
"Controlling Switch Access with TACACS+" section on
"Controlling Switch Access with RADIUS" section on
6-44)
"Configuring the Switch for
OL-13270-06

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst blade 3130Catalyst blade 3032

Table of Contents