Configuring The Switch For Secure Shell; Understanding Ssh; Configuring Ssh - Cisco Catalyst 2950 Software Configuration Manual

Hide thumbs Also See for Catalyst 2950:
Table of Contents

Advertisement

Configuring the Switch for Secure Shell

Configuring the Switch for Secure Shell
This section describes how to configure the Secure Shell (SSH) feature. To use this feature, the crypto
(encrypted) software image must be installed on your switch.You must download this software image
from Cisco.com. For more information, refer to the release notes for this release.
Note
For complete syntax and usage information for the commands used in this section, refer to the "Secure
Shell Commands" section in the Cisco IOS Security Command Reference for Release 12.2.

Understanding SSH

SSH is a protocol that provides a secure, remote connection to a Layer 2 device. There are two versions
of SSH: SSH version 1 and SSH version 2. This software release only supports SSH version 1.
SSH provides more security for remote connections than Telnet by providing strong encryption when a
client is authenticated. The SSH feature has an SSH server and an SSH integrated client. The client
supports these user authentication methods:
For more information about SSH, refer to the "Configuring Secure Shell" section in the Cisco IOS
Security Configuration Guide for Release 12.2.
Note
The SSH feature in this software release does not support IP Security (IPSec).

Configuring SSH

Before configuring SSH, download the enhanced crypto software image from Cisco.com. For more
information, refer to the release notes for this release.
For information about configuring SSH and displaying SSH settings, refer to the "Configuring Secure
Shell" section in the Cisco IOS Security Configuration Guide for Release 12.2.
Catalyst 2950 Desktop Switch Software Configuration Guide
7-32
TACACS+ (for more information, see the
page
7-9)
RADIUS (for more information, see the
page
7-17)
Local authentication and authorization (for more information, see the
Local Authentication and Authorization" section on page
"Controlling Switch Access with TACACS+" section on
"Controlling Switch Access with RADIUS" section on
7-31)
Chapter 7
Administering the Switch
"Configuring the Switch for
78-11380-04

Advertisement

Table of Contents
loading

Table of Contents