Verification - Cisco Catalyst 2000 Configuration Handbook

Catalyst series lan switching
Table of Contents

Advertisement

184 Cisco LAN Switching Configuration Handbook
Enable HTTP access control:
3.
(global) ip http access-class {access-list-number | name}

Verification

Use the following command to verify the configuration of the access class:
show line [line-number | summary]
Feature Example
The following example shows an access class configuration. This list enables any user
from the network 172.168.5.0 to access the device for Telnet. This example also enables
any user from the 172.168.1.0 subnet to access the device via Telnet:
switch# configure terminal
switch (config)# access-list 1 permit 172.168.5.0 0.0.0.255
switch (config)# line vty 5 10
switch (config-line)# access-class 1 in
switch (config-line)# exit
11-7: SSH Telnet Configuration
Telnet connections to the switch take place over TCP port 23 and are transmitted in
plain text.
If someone with a network analyzer captures packets going to a server, he can see
the data transmitted in plain text, including the passwords.
Secure Shell (SSH) is a method of communicating through Telnet that encrypts
packets before they are transmitted between devices.
SSH runs on TCP port 22 between an SSH-compatible client and a device configured
to accept SSH connections.
Cisco switches support SSH.
To implement SSH on your switch, it must be Crypto-compatible code.
By default SSH is disabled on the switch and must be enabled before clients can con-
nect.
Configuration
To provide secure Telnet communications between the switch and an SSH Telnet client,
you must configure the switch to enable SSH connectivity. The following commands out-
line the configuration steps to activate SSH.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents