Configuration Examples For Secure Shell - Cisco Catalyst 2960 series Configuration Manual

Consolidated platform configuration guide, ios release 15.2(4)e
Hide thumbs Also See for Catalyst 2960 series:
Table of Contents

Advertisement

Command or Action
Example:
Device(config)# aaa authorization exec default
group tacacs+
Step 6
username name [privilege level] password
encryption-type encrypted-password
Example:
Device(config)# username superuser privilege 2
password 0 superpassword
Step 7
ip scp server enable
Example:
Device(config)# ip scp server enable
Step 8
exit
Example:
Device(config)# exit
Step 9
show running-config
Example:
Device# show running-config
Step 10
debug ip scp
Example:
Device# debug ip scp

Configuration Examples for Secure Shell

Example: Secure Copy Configuration Using Local Authentication
The following example shows how to configure the server-side functionality of Secure Copy (SCP). This
example uses a locally defined username and password.
! AAA authentication and authorization must be configured properly in order for SCP to work.
aaa new-model
aaa authentication login default local
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(4)E (Catalyst 2960-X Switches)
Configuration Examples for Secure Shell
Purpose
Establishes a username-based authentication system.
Note
You may omit this step if a network-based
authentication mechanism, such as TACACS+
or RADIUS, has been configured.
Enables SCP server-side functionality.
Exits global configuration mode and returns to privileged
EXEC mode.
(Optional) Displays the SCP server-side functionality.
(Optional) Troubleshoots SCP authentication problems.
1085

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents