EasyManuals Logo

Cisco Catalyst 3750 Software Configuration Guide

Cisco Catalyst 3750
926 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #159 background imageLoading...
Page #159 background image
7-37
Catalyst 3750 Metro Switch Software Configuration Guide
78-15870-01
Chapter 7 Configuring Switch-Based Authentication
Configuring the Switch for Secure Shell
Configuring the Switch for Secure Shell
This section describes how to configure the Secure Shell (SSH) feature. The cryptographic (that is,
supports encryption) version of the switch software must be installed on your switch. You must obtain
authorization to use this feature and to download the cryptographic software files from Cisco.com. For
more information, refer to the release notes for this release.
This section contains this configuration information:
Understanding SSH, page 7-37
Configuring SSH, page 7-37
Note For complete syntax and usage information for the commands used in this section, refer to the “Secure
Shell Commands” section in the Cisco IOS Security Command Reference for Release 12.1.
Understanding SSH
SSH is a protocol that provides a secure, remote connection to a device. SSH provides more security for
remote connections than Telnet by providing strong encryption when a device is authenticated. The SSH
feature has an SSH server and an SSH integrated client.
This software release only supports SSH version 1.
Note The SSH feature in this software release does not support IP Security (IPSec).
SSH supports these user authentication methods:
TACACS+ (For more information, see the “Controlling Switch Access with TACACS+” section on
page 7-10.)
RADIUS (For more information, see the “Controlling Switch Access with RADIUS” section on
page 7-17.)
Local authentication and authorization (For more information, see the “Configuring the Switch for
Local Authentication and Authorization” section on page 7-36.)
For more information about SSH, refer to the “Configuring Secure Shell” section in the Cisco IOS
Security Configuration Guide for Release 12.1.
Configuring SSH
Before configuring SSH, download the cryptographic version of the switch software image from
Cisco.com. For more information, refer to the release notes for this release.
For information about configuring SSH and displaying SSH settings, refer to the “Configuring Secure
Shell” section in the Cisco IOS Security Configuration Guide for Release 12.1.

Table of Contents

Other manuals for Cisco Catalyst 3750

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 3750 and is the answer not in the manual?

Cisco Catalyst 3750 Specifications

General IconGeneral
Device TypeSwitch
Switching Capacity32 Gbps
Forwarding Rate38.7 Mpps
Stacking Bandwidth32 Gbps
RAM128 MB
Jumbo Frame SupportYes
Switch TypeManaged
ModelCatalyst 3750 Series
Uplink InterfacesSFP
Form FactorRack-mountable
MAC Address Table Size12, 000 entries
Routing ProtocolRIP, OSPF, EIGRP
Remote Management ProtocolSNMP, Telnet, HTTP
FeaturesLayer 3 switching, Layer 2 switching, auto-negotiation, BOOTP support, ARP support, VLAN support, auto-uplink (auto MDI/MDI-X), IGMP snooping, traffic shaping, MAC address filtering, Quality of Service (QoS), Jumbo Frames support, MLD snooping, Dynamic ARP Inspection (DAI), Cisco EnergyWise technology
Power over Ethernet (PoE)PoE
Operating Temperature-5 - 45 °C
Operating Humidity10% to 85% non-condensing

Related product manuals