PurposeCommand or Action
Enters global configuration mode.configure terminal
Example:
host1# configure terminal
Step 12
Ensures that server authentication takes place.ip ssh stricthostkeycheck
Step 13
Example:
host1(config)# ip ssh stricthostkeycheck
•
The connection is terminated in case of a failure.
•
Use no hostname command to return to the default host.
Starting an Encrypted Session with a Remote Device
The device with which you want to connect must support a Secure Shell (SSH) server that has an encryption
algorithm that is supported in Cisco software. Also, you need not enable your device. SSH can be run in
disabled mode.
Note
SUMMARY STEPS
1.
ssh [-v {1 | 2} | -c {aes128-ctr | aes192-ctr | aes256-ctr | aes128-cbc | 3des | aes192-cbc | aes256-cbc} |
-l user-id | -l user-id:vrf-name number ip-address ip-address | -l user-id:rotary number ip-address | -m
{hmac-md5-128 | hmac-md5-96 | hmac-sha1-160 | hmac-sha1-96} | -o numberofpasswordprompts
n | -p port-num] {ip-addr | hostname} [command | -vrf]
DETAILED STEPS
PurposeCommand or Action
Starts an encrypted session with a
remote networking device.
ssh [-v {1 | 2} | -c {aes128-ctr | aes192-ctr | aes256-ctr | aes128-cbc | 3des | aes192-cbc
| aes256-cbc} | -l user-id | -l user-id:vrf-name number ip-address ip-address | -l
user-id:rotary number ip-address | -m {hmac-md5-128 | hmac-md5-96 |
Step 1
hmac-sha1-160 | hmac-sha1-96} | -o numberofpasswordprompts n | -p port-num]
{ip-addr | hostname} [command | -vrf]
Example:
Device# ssh -v 2 -c aes256-ctr -m hmac-sha1-96 -l user2 10.76.82.24
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(4)E (Catalyst 2960-X Switches)
1100
How to Configure Secure Shell Version 2 Support