179
 
Configuring Switch-Based Authentication
How to Configure Switch-Based Authentication
Configuring Secure Shell
Setting Up the Switch to Run SSH
Configuring the SSH Server
6. username name [privilege level] 
{password encryption-type 
password}
Enters the local database, and establishes a username-based authentication 
system.
Repeat this command for each user.
 name—Specifies the user ID as one word. Spaces and quotation marks 
are not allowed.
 (Optional) level—Specifies the privilege level the user has after gaining 
access. The range is 0 to 15. Level 15 gives privileged EXEC mode 
access. Level 0 gives user EXEC mode access.
 encryption-type—Enters 0 to specify that an unencrypted password 
follows. Enter 7 to specify that a hidden password follows.
 password—Specifies the password the user must enter to gain access to 
the switch. The password must be from 1 to 25 characters, can contain 
embedded spaces, and must be the last option specified in the 
username command.
7. end Returns to privileged EXEC mode.
8. show running-config Verifies your entries.
9. copy running-config 
startup-config
(Optional) Saves your entries in the configuration file.
Command Purpose
Task Purpose
1. Download the cryptographic software image from 
Cisco.com.
(Required) For more information, see the notes for 
this release.
2. Configure a hostname and IP domain name for the switch.  Follow this procedure only if you are configuring the 
switch as an SSH server.
3. Generate an RSA key pair for the switch, which automatically 
enables SSH. 
Follow this procedure only if you are configuring the 
switch as an SSH server. 
4. Configure user authentication for local or remote access.  (Required) For more information, see Configuring 
the Switch for Local Authentication and 
Authorization, page 178.
Command Purpose
1. configure terminal Enters global configuration mode.
2. hostname hostname Configures a hostname for your switch.
3. ip domain-name domain_name Configures a host domain for your switch.