7-32
Catalyst 2360 Switch Software Configuration Guide
OL-19808-01
Chapter 7 Configuring Switch-Based Authentication
Configuring the Switch for Secure Shell
Note
To secure the switch for HTTP access by using AAA methods, you must configure the switch with the
ip http authentication aaa
global configuration command. Configuring AAA authentication does not
secure the switch for HTTP access by using AAA methods.
For more information about the
ip http authentication
command, see the
Cisco IOS Security Command
Reference, Release 12.2
.
Configuring the Switch for Secure Shell
This section describes how to configure the Secure Shell (SSH) feature. To use this feature, you must
install the cryptographic (encrypted) software image on your switch. You must obtain authorization to
use this feature and to download the cryptographic software files from Cisco.com. For more information,
see the release notes for this release.
These sections contain this information:
•
•
•
Displaying the SSH Configuration and Status, page 7-36
For SSH configuration examples, see the “SSH Configuration Examples” section in the “Configuring
Secure Shell” section in the “Other Security Features” chapter of the
Cisco IOS Security Configuration
Guide, Cisco IOS Release 12.2
, at this URL:
Note
For complete syntax and usage information for the commands used in this section, see the command
reference for this release and the “Secure Shell Commands” section of the “Other Security Features”
chapter of the
Cisco IOS Security Command Reference, Release 12.2
at this URL:
Understanding SSH
SSH is a protocol that provides a secure, remote connection to a device. SSH provides more security for
remote connections than Telnet does by providing strong encryption when a device is authenticated. This
software release supports SSH Version 1 (SSHv1) and SSH Version 2 (SSHv2).
This section consists of these topics:
•
SSH Servers, Integrated Clients, and Supported Versions, page 7-33
•