C H A P T E R
8
Configuring Secure Shell (SSH)
•
Finding Feature Information, page 113
•
Prerequisites for Configuring Secure Shell, page 113
•
Restrictions for Configuring Secure Shell, page 114
•
Information about SSH, page 114
•
How to Configure SSH, page 117
•
Monitoring the SSH Configuration and Status, page 121
•
Additional References, page 121
•
Feature Information for SSH, page 122
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest caveats and
feature information, see Bug Search Tool and the release notes for your platform and software release. To
find information about the features documented in this module, and to see a list of the releases in which each
feature is supported, see the feature information table at the end of this module.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to
. An account on Cisco.com is not
required.
Prerequisites for Configuring Secure Shell
The following are the prerequisites for configuring the switch for secure shell (SSH):
•
For SSH to work, the switch needs an Rivest, Shamir, and Adleman (RSA) public/private key pair. This
is the same with Secure Copy Protocol (SCP), which relies on SSH for its secure transport.
•
Before enabling SCP, you must correctly configure SSH, authentication, and authorization on the switch.
•
Because SCP relies on SSH for its secure transport, the router must have an Rivest, Shamir, and Adelman
(RSA) key pair.
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
OL-29048-01
113