8-37
Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide
78-11380-12
Chapter 8 Configuring Switch-Based Authentication
Configuring the Switch for Secure Copy Protocol
Displaying the SSH Configuration and Status
To display the SSH server configuration and status, use one or more of the privileged EXEC commands
in Table 8-2:
For more information about these commands, see the “Secure Shell Commands” section in the “Other
Security Features” chapter of the Cisco IOS Security Command Reference, Cisco IOS Release 12.2, at
this URL:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fsecur_r/fothercr/
srfssh.htm.
Configuring the Switch for Secure Copy Protocol
The Secure Copy (SCP) feature provides a secure and authenticated method for copying switch
configuration or switch image files. SCP relies on Secure Shell (SSH), an application and a protocol that
provide a secure replacement for the Berkeley r-tools.
In order for SSH to work, the switch needs to have an RSA public/private key pair. This is no different
with SCP, which relies on SSH for its secure transport.
Also, since SSH relies on AAA authentication, and scp relies further on AAA authorization, this needs
to be configured correctly.
• •Before enabling SCP, you must correctly configure SSH, authentication, and authorization on the
switch.
•Because SCP relies on SSH for its secure transport, the switch must have an Rivest, Shamir, and
Adelman (RSA) key pair.
Note When using SCP, you cannot enter the password into the copy command. You must enter the password
when prompted.
For further information on how to configure and verify SCP, see the “Secure Copy Protocol” chapter of
the Cisco IOS Release 12.2, at this URL:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122newft/122t/122t2/ftscp.htm
Table 8-2 Commands for Displaying the SSH Server Configuration and Status
Command Purpose
show ip ssh Shows the version and configuration information for the SSH server.
show ssh Shows the status of the SSH server.