Configuring The Switch For Secure Shell; Understanding Ssh; Configuring Ssh - Cisco 2950G 24 - Catalyst Switch Software Configuration Manual

Desktop switch
Hide thumbs Also See for 2950G 24 - Catalyst Switch:
Table of Contents

Advertisement

Chapter 7
Administering the Switch

Configuring the Switch for Secure Shell

This section describes how to configure the Secure Shell (SSH) feature. To use this feature, the crypto
(encrypted) multilayer software image must be installed on your switch. You must download this
software image from Cisco.com. For more information, refer to the release notes for this release.
Note
For complete syntax and usage information for the commands used in this section, refer to the "Secure
Shell Commands" section in the Cisco IOS Security Command Reference for Release 12.1.

Understanding SSH

SSH is a protocol that provides a secure, remote connection to a Layer 2 or a Layer 3 device. There are
two versions of SSH: SSH version 1 and SSH version 2. This software release only supports SSH
version 1.
SSH provides more security for remote connections than Telnet by providing strong encryption when a
device is authenticated. The SSH feature has an SSH server and an SSH integrated client. The client
supports these user authentication methods:
For more information about SSH, refer to the "Configuring Secure Shell" section in the Cisco IOS
Security Configuration Guide for Release 12.2.
The SSH feature in this software release does not support IP Security (IPSec).
Note

Configuring SSH

Before configuring SSH, download the crypto software image from Cisco.com. For more information,
refer to the release notes for this release.
For information about configuring SSH and displaying SSH settings, refer to the "Configuring Secure
Shell" section in the Cisco IOS Security Configuration Guide for Release 12.2.
78-14982-01
TACACS+ (for more information, see the
page
7-10)
RADIUS (for more information, see the
page
7-18)
Local authentication and authorization (for more information, see the
Local Authentication and Authorization" section on page
Configuring the Switch for Secure Shell
"Controlling Switch Access with TACACS+" section on
"Controlling Switch Access with RADIUS" section on
7-32)
Catalyst 2950 Desktop Switch Software Configuration Guide
"Configuring the Switch for
7-33

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 2950

Table of Contents