EasyManuals Logo

Cisco 3845 - Security Bundle Router Software Guide

Cisco 3845 - Security Bundle Router
956 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #182 background imageLoading...
Page #182 background image
8-38
Cisco ME 3800X and 3600X Switch Software Configuration Guide
OL-23400-01
Chapter 8 Configuring Switch-Based Authentication
Configuring the Switch for Secure Shell
2. Configure a hostname and IP domain name for the switch. Follow this procedure only if you are
configuring the switch as an SSH server.
3. Generate an RSA key pair for the switch, which automatically enables SSH. Follow this procedure
only if you are configuring the switch as an SSH server.
4. Configure user authentication for local or remote access. This step is required. For more
information, see the “Configuring the Switch for Local Authentication and Authorization” section
on page 8-35.
Beginning in privileged EXEC mode, follow these steps to configure a hostname and an IP domain name
and to generate an RSA key pair. This procedure is required if you are configuring the switch as an SSH
server.
To delete the RSA key pair, use the crypto key zeroize rsa global configuration command. After the
RSA key pair is deleted, the SSH server is automatically disabled.
Configuring the SSH Server
Beginning in privileged EXEC mode, follow these steps to configure the SSH server:
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
hostname hostname Configure a hostname for your switch.
Step 3
ip domain-name domain_name Configure a host domain for your switch.
Step 4
crypto key generate rsa Enable the SSH server for local and remote authentication on the switch
and generate an RSA key pair.
We recommend that a minimum modulus size of 1024 bits.
When you generate RSA keys, you are prompted to enter a modulus
length. A longer modulus length might be more secure, but it takes longer
to generate and to use.
Step 5
end Return to privileged EXEC mode.
Step 6
show ip ssh
or
show ssh
Show the version and configuration information for your SSH server.
Show the status of the SSH server on the switch.
Step 7
copy running-config startup-config (Optional) Save your entries in the configuration file.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
ip ssh version [1 | 2] (Optional) Configure the switch to run SSH Version 1 or SSH Version 2.
1—Configure the switch to run SSH Version 1.
2—Configure the switch to run SSH Version 2.
If you do not enter this command or do not specify a keyword, the SSH
server selects the latest SSH version supported by the SSH client. For
example, if the SSH client supports SSHv1 and SSHv2, the SSH server
selects SSHv2.

Table of Contents

Other manuals for Cisco 3845 - Security Bundle Router

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 3845 - Security Bundle Router and is the answer not in the manual?

Cisco 3845 - Security Bundle Router Specifications

General IconGeneral
BrandCisco
Model3845 - Security Bundle Router
CategorySwitch
LanguageEnglish

Related product manuals