Understanding Ssh; Ssh Servers, Integrated Clients, And Supported Versions; Limitations - Cisco Catalyst 3750-X Software Configuration Manual

Hide thumbs Also See for Catalyst 3750-X:
Table of Contents

Advertisement

Chapter 10
Configuring Switch-Based Authentication
For complete syntax and usage information for the commands used in this section, see the command
Note
reference for this release and the "Secure Shell Commands" section of the "Other Security Features"
chapter of the Cisco IOS Security Command Reference, Release 12.2 at this URL:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_command_reference_chapter0918
6a00800ca7d0.html

Understanding SSH

SSH is a protocol that provides a secure, remote connection to a device. SSH provides more security for
remote connections than Telnet does by providing strong encryption when a device is authenticated. This
software release supports SSH Version 1 (SSHv1) and SSH Version 2 (SSHv2).
This section consists of these topics:

SSH Servers, Integrated Clients, and Supported Versions

The SSH feature has an SSH server and an SSH integrated client, which are applications that run on the
switch. You can use an SSH client to connect to a switch running the SSH server. The SSH server works
with the SSH client supported in this release and with non-Cisco SSH clients. The SSH client also works
with the SSH server supported in this release and with non-Cisco SSH servers.
The switch supports an SSHv1 or an SSHv2 server.
The switch supports an SSHv1 client.
SSH supports the Data Encryption Standard (DES) encryption algorithm, the Triple DES (3DES)
encryption algorithm, and password-based user authentication.
SSH also supports these user authentication methods:
This software release does not support IP Security (IPSec).
Note
OL-21521-01
SSH Servers, Integrated Clients, and Supported Versions, page 10-45
Limitations, page 10-46
TACACS+ (for more information, see the
page
10-10)
RADIUS (for more information, see the
page
10-17)
Local authentication and authorization (for more information, see the
Local Authentication and Authorization" section on page
"Controlling Switch Access with TACACS+" section on
"Controlling Switch Access with RADIUS" section on
10-43)
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
Configuring the Switch for Secure Shell
"Configuring the Switch for
10-45

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 3560-x

Table of Contents