Configuring the Cisco SSH Server to Perform RSA-Based User Authentication
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
hostname name
4.
ip domain-name name
5.
crypto key generate rsa
6.
ip ssh pubkey-chain
7.
username username
8.
key-string
9.
key-hash key-type key-name
10.
end
DETAILED STEPS
Purpose
Command or Action
Enables privileged EXEC mode.
enable
Step 1
Example:
Device> enable
•
Enter your password if prompted.
Enters global configuration mode.
configure terminal
Example:
Device# configure terminal
Step 2
Specifies the hostname.
hostname name
Example:
Device(config)# hostname host1
Step 3
Defines a default domain name that the Cisco software uses to complete
unqualified hostnames.
ip domain-name name
Example:
host1(config)# ip domain-name name1
Step 4
Generates RSA key pairs.
crypto key generate rsa
Example:
host1(config)# crypto key generate rsa
Step 5
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(4)E (Catalyst 2960-X Switches)
1096
How to Configure Secure Shell Version 2 Support
Summary of Contents for Catalyst 2960 Series
Page 96: ......
Page 196: ......
Page 250: ......
Page 292: ......
Page 488: ......
Page 589: ...P A R T VI Cisco Flexible NetFlow Configuring NetFlow Lite page 509 ...
Page 590: ......
Page 619: ...P A R T VII QoS Configuring QoS page 539 Configuring Auto QoS page 645 ...
Page 620: ......
Page 750: ......
Page 1604: ......
Page 1740: ......
Page 2105: ...P A R T XII Configuring Cisco IOS IP SLAs Configuring Cisco IP SLAs page 2025 ...
Page 2106: ......
Page 2118: ......
Page 2164: ......