9-42
Catalyst 2975 Switch Software Configuration Guide
OL-19720-02
Chapter 9 Configuring Switch-Based Authentication
Configuring the Switch for Secure Shell
For SSH configuration examples, see the “SSH Configuration Examples” section in the “Configuring
Secure Shell” chapter of the
Cisco IOS Security Configuration Guide, Cisco IOS Release 12.2
:
http://www.cisco.com/en/US/docs/ios/12_2/security/configuration/guide/scfssh.html
Note
For complete syntax and usage information for the commands used in this section, see the command
reference for this release and the command reference for Cisco IOS Release 12.2:
http://www.cisco.com/en/US/docs/ios/12_2/security/command/reference/fsecur_r.html
Understanding SSH
SSH is a protocol that provides a secure, remote connection to a device. SSH provides more security for
remote connections than Telnet does by providing strong encryption when a device is authenticated. This
software release supports SSH Version 1 (SSHv1) and SSH Version 2 (SSHv2).
This section consists of these topics:
•
SSH Servers, Integrated Clients, and Supported Versions, page 9-42
•
Note
The SSH connection to the switch stack can be lost if a stack master running the cryptographic version
of the software fails and is replaced by a switch that is running a noncryptographic version of the
software. We recommend that a switch running the cryptographic version of the software be the stack
master.
SSH Servers, Integrated Clients, and Supported Versions
The SSH feature has an SSH server and an SSH integrated client, which are applications that run on the
switch. You can use an SSH client to connect to a switch running the SSH server. The SSH server works
with the SSH client supported in this release and with non-Cisco SSH clients. The SSH client also works
with the SSH server supported in this release and with non-Cisco SSH servers.
The switch supports an SSHv1 or an SSHv2 server.
The switch supports an SSHv1 client.
SSH supports the Data Encryption Standard (DES) encryption algorithm, the Triple DES (3DES)
encryption algorithm, and password-based user authentication.
SSH also supports these user authentication methods:
•
(for more information, see the
“Controlling Switch Access with ” section on
•
RADIUS (for more information, see the
“Controlling Switch Access with RADIUS” section on
•
Local authentication and authorization (for more information, see the
Local Authentication and Authorization” section on page 9-40
Note
This software release does not support IP Security (IPSec).
Содержание 2975 - Catalyst LAN Base Switch
Страница 36: ...Contents xxxvi Catalyst 2975 Switch Software Configuration Guide OL 19720 02 ...
Страница 40: ...xxxviii Catalyst 2975 Switch Software Configuration Guide OL 19720 02 Preface ...
Страница 62: ...1 22 Catalyst 2975 Switch Software Configuration Guide OL 19720 02 Chapter 1 Overview Where to Go Next ...
Страница 398: ...13 30 Catalyst 2975 Switch Software Configuration Guide OL 19720 02 Chapter 13 Configuring VLANs Configuring VMPS ...
Страница 424: ...15 18 Catalyst 2975 Switch Software Configuration Guide OL 19720 02 Chapter 15 Configuring VTP Monitoring VTP ...
Страница 628: ...26 8 Catalyst 2975 Switch Software Configuration Guide OL 19720 02 Chapter 26 Configuring UDLD Displaying UDLD Status ...
Страница 660: ...28 8 Catalyst 2975 Switch Software Configuration Guide OL 19720 02 Chapter 28 Configuring RMON Displaying RMON Status ...
Страница 888: ...38 32 Catalyst 2975 Switch Software Configuration Guide OL 19720 02 Chapter 38 Troubleshooting Troubleshooting Tables ...