11-35
Cisco IE 3000 Switch Software Configuration Guide
OL-13018-03
Chapter 11 Configuring Switch-Based Authentication
Configuring the Switch for Secure Shell
•
When generating the RSA key pair, the message
No domain specified
might appear. If it does, you
must configure an IP domain name by using the
ip domain-name
global configuration command.
•
When configuring the local authentication and authorization authentication method, make sure that
AAA is disabled on the console.
Setting Up the Switch to Run SSH
Follow these steps to set up your switch to run SSH:
1.
Download the cryptographic software image from Cisco.com. This step is required. For more
information, see the release notes for this release.
2.
Configure a hostname and IP domain name for the switch. Follow this procedure only if you are
configuring the switch as an SSH server.
3.
Generate an RSA key pair for the switch, which automatically enables SSH. Follow this procedure
only if you are configuring the switch as an SSH server.
4.
Configure user authentication for local or remote access. This step is required. For more
information, see the
“Configuring the Switch for Local Authentication and Authorization” section
on page 11-32
.
Beginning in privileged EXEC mode, follow these steps to configure a hostname and an IP domain name
and to generate an RSA key pair. This procedure is required if you are configuring the switch as an SSH
server.
To delete the RSA key pair, use the
crypto key zeroize rsa
global configuration command. After the
RSA key pair is deleted, the SSH server is automatically disabled.
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
hostname
hostname
Configure a hostname for your switch.
Step 3
ip domain-name
domain_name
Configure a host domain for your switch.
Step 4
crypto key generate rsa
Enable the SSH server for local and remote authentication on the switch
and generate an RSA key pair.
We recommend that a minimum modulus size of 1024 bits.
When you generate RSA keys, you are prompted to enter a modulus
length. A longer modulus length might be more secure, but it takes longer
to generate and to use.
Step 5
end
Return to privileged EXEC mode.
Step 6
show ip ssh
or
show ssh
Show the version and configuration information for your SSH server.
Show the status of the SSH server on the switch.
Step 7
copy running-config startup-config
(Optional) Save your entries in the configuration file.