Purpose
Command or Action
When you generate RSA keys, you are prompted to enter a modulus
length. A longer modulus length might be more secure, but it takes
longer to generate and to use.
rsa
Follow this procedure only if you are configuring the switch
as an SSH server.
Note
Returns to privileged EXEC mode.
end
Example:
Switch(config)#
end
Step 5
Related Topics
SSH Configuration Guidelines, on page 87
Configuring the Switch for Local Authentication and Authorization, on page 81
Configuring the SSH Server
Beginning in privileged EXEC mode, follow these steps to configure the SSH server:
This procedure is only required if you are configuring the switch as an SSH server.
Note
SUMMARY STEPS
1.
configure terminal
2.
ip ssh version
[
1
|
2
]
3.
ip ssh
{
timeout seconds
|
authentication-retries number
}
4.
Use one or both of the following:
•
line vtyline_number
[
ending_line_number
]
•
transport input ssh
5.
end
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
90
OL-29434-01
Configuring Secure Shell (SSH)
Configuring the SSH Server