Configuring The Switch For Secure Shell - Cisco 3020 - Catalyst Blade Switch Configuration Manual

Cisco catalyst blade switch 3020 for hp software configuration guide, rel. 12.2(25)sef1
Hide thumbs Also See for 3020 - Cisco Catalyst Blade Switch:
Table of Contents

Advertisement

Chapter 6
Configuring Switch-Based Authentication
Command
Step 6
username name [privilege level]
{password encryption-type password}
Step 7
end
Step 8
show running-config
Step 9
copy running-config startup-config
To disable AAA, use the no aaa new-model global configuration command. To disable authorization,
use the no aaa authorization {network | exec} method1 global configuration command.
To secure the switch for HTTP access by using AAA methods, you must configure the switch with the
Note
ip http authentication aaa global configuration command. Configuring AAA authentication does not
secure the switch for HTTP access by using AAA methods.
For more information about the ip http authentication command, see the Cisco IOS Security Command
Reference, Release 12.2.

Configuring the Switch for Secure Shell

This section describes how to configure the Secure Shell (SSH) feature. To use this feature, you must
install the cryptographic (encrypted) software image on your switch. You must obtain authorization to
use this feature and to download the cryptographic software files from Cisco.com. For more information,
see the release notes for this release.
These sections contain this information:
OL-8915-01
Purpose
Enter the local database, and establish a username-based authentication
system.
Repeat this command for each user.
Return to privileged EXEC mode.
Verify your entries.
(Optional) Save your entries in the configuration file.
Understanding SSH, page 6-38
Configuring SSH, page 6-39
Displaying the SSH Configuration and Status, page 6-41
For name, specify the user ID as one word. Spaces and quotation
marks are not allowed.
(Optional) For level, specify the privilege level the user has after
gaining access. The range is 0 to 15. Level 15 gives privileged EXEC
mode access. Level 0 gives user EXEC mode access.
For encryption-type, enter 0 to specify that an unencrypted password
follows. Enter 7 to specify that a hidden password follows.
For password, specify the password the user must enter to gain access
to the switch. The password must be from 1 to 25 characters, can
contain embedded spaces, and must be the last option specified in the
username command.
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
Configuring the Switch for Secure Shell
6-37

Advertisement

Table of Contents
loading

Table of Contents