Configuration Guide     508
Configuring Access Security Access Security Configurations
The following example shows how to configure the SSH function. Set the version as SSH 
V1 and SSH V2. Enable the AES128-CBC and Cast128-CBC encryption algorithm. Enable 
the HMAC-MD5 data integrity algorithm. Choose the key type as SSH-2 RSA/DSA.
Switch(config)#ip ssh server
Switch(config)#ip ssh version v1
Switch(config)#ip ssh version v2
Switch(config)#ip ssh timeout 100
Switch(config)#ip ssh max-client 4
Switch(config)#ip ssh algorithm AES128-CBC
Switch(config)#ip ssh algorithm Cast128-CBC
Switch(config)#ip ssh algorithm HMAC-MD5
Switch(config)#ip ssh download v2 publickey ip-address 192.168.0.100
 Start to download SSH key file......
 Download SSH key file OK.
Switch(config)#show ip ssh
 Global Config:
  SSH Server:         Enabled
  Protocol V1:        Enabled
  Protocol V2:        Enabled
  Idle Timeout:       100
  MAX Clients:        4
  Port:                        22
 Encryption Algorithm:
  AES128-CBC:         Enabled
  AES192-CBC:         Disabled
  AES256-CBC:         Disabled
  Blowfish-CBC:       Disabled
  Cast128-CBC:        Enabled
  3DES-CBC:             Disabled
 Data Integrity Algorithm:
  HMAC-SHA1:         Disabled