Configuring Secure Shell (SSH) 
Steps for Configuring and Using SSH for Switch and Client Authentication 
Steps for Configuring and Using SSH
 for Switch and Client Authentication 
For two-way authentication between the switch and an SSH client, you must 
use the login (Operator) level. 
Table 7-1.  SSH Options 
Switch 
Access 
Authentication 
Authenticate  Authenticate  Secondary Switch 
Authentication 
1 
No
1 
Level 
Primary SSH 
Switch Public Key 
to SSH Clients? 
Client Public Key 
to the Switch? 
Primary Switch 
Password 
Authentication 
Password 
Yes
Operator  ssh login rsa  Yes  local or none 
(Login) 
ssh login Local  Yes  No  Yes  local or none 
Level 
ssh login TACACS  Yes  No  Yes  local or none 
ssh login RADIUS  Yes  No  Yes  local or none 
Manager  ssh enable local  Yes  No  Yes  local or none 
(Enable) 
ssh enable tacacs  Yes  No  Yes  local or none 
Level 
ssh enable radius  Yes  No  Yes  local or none 
1 
For ssh login public-key, the switch uses client public-key authentication instead of the switch password options for 
primary authentication. 
The general steps for configuring SSH include: 
A. Client Preparation 
1.  Install an SSH client application on a management station you want 
to use for access to the switch. (Refer to the documentation provided 
with your SSH client application.) 
2.  Optional—If you want the switch to authenticate a client public-key 
on the client: 
a.  Either generate a public/private key pair on the client computer  
(if your client application allows) or import a client key pair that 
you have generated using another SSH application. 
b.  Copy the client public key into an ASCII file on a TFTP server 
accessible to the switch and download the client public key file to 
the switch. (The client public key file can hold up to 10 client keys.) 
This topic is covered under 
“To Create a Client-Public-Key Text 
File” on page 7-23. 
7-6