7-33
Catalyst 2360 Switch Software Configuration Guide
OL-19808-01
Chapter 7 Configuring Switch-Based Authentication
Configuring the Switch for Secure Shell
SSH Servers, Integrated Clients, and Supported Versions
The SSH feature has an SSH server and an SSH integrated client, which are applications that run on the
switch. You can use an SSH client to connect to a switch running the SSH server. The SSH server works
with the SSH client supported in this release and with non-Cisco SSH clients. The SSH client also works
with the SSH server supported in this release and with non-Cisco SSH servers.
The switch supports an SSHv1 or an SSHv2 server.
The switch supports an SSHv1 or an SSHv2 client.
SSH supports the Data Encryption Standard (DES) encryption algorithm, the Triple DES (3DES)
encryption algorithm, and password-based user authentication.
SSH also supports these user authentication methods:
•
(for more information, see the
“Controlling Switch Access with ” section on
)
•
RADIUS (for more information, see the
“Controlling Switch Access with RADIUS” section on
)
•
Local authentication and authorization (for more information, see the
Local Authentication and Authorization” section on page 7-31
)
Note
This software release does not support IP Security (IPSec).
Limitations
These limitations apply to SSH:
•
The switch supports Rivest, Shamir, and Adelman (RSA) authentication.
•
SSH supports only the execution-shell application.
•
The SSH server and the SSH client are supported only on DES (56-bit) and 3DES (168-bit) data
encryption software.
•
The switch does not support the Advanced Encryption Standard (AES) symmetric encryption
algorithm.
Configuring SSH
This section has this configuration information:
•
Configuration Guidelines, page 7-34
•
Setting Up the Switch to Run SSH, page 7-34
(required)
•
Configuring the SSH Server, page 7-35
(required only if you are configuring the switch as an SSH
server)