19-5
Catalyst 6000 Family Software Configuration Guide—Releases 6.3 and 6.4
78-13315-02
Chapter 19 Checking Port Status and Connectivity
Using Secure Shell Encryption for Telnet Sessions
To Telnet to another device on the network from the switch, perform this task in privileged mode:
This example shows how to Telnet from the switch to a remote host:
Console> (enable)
telnet labsparc
Trying 172.16.10.3...
Connected to labsparc.
Escape character is '^]'.
UNIX(r) System V Release 4.0 (labsparc)
login:
Using Secure Shell Encryption for Telnet Sessions
Note
To use the Secure Shell encryption feature commands, you must be running an encryption image.
The
set crypto key rsa
,
clear crypto key rsa
, and
show crypto key
commands are used for
encryption. See
Chapter 25, “Working with System Software Images”
for the software image naming
conventions used for the encryption images.
The Secure Shell encryption feature provides security for Telnet sessions to the switch. Secure Shell
encryption is supported for remote logins to the switch only. Telnet sessions initiated from the switch
cannot be encrypted. To use this feature, you must install the application on the client accessing the
switch, and you must configure Secure Shell encryption on the switch.
The current implementation of Secure Shell encryption supports SSH version 1, the DES and 3DES
encryption methods, and can be used with RADIUS and authentication. To configure
authentication with Secure Shell encryption, use the
telnet
keyword in the
set authentication
commands.
Note
If you are using Kerberos to authenticate to the switch, you will not be able to use the Secure Shell
encryption feature.
To enable Secure Shell encryption on the switch, perform this task in privileged mode:
This example shows how to create the RSA host key:
Console> (enable)
set crypto key rsa 1024
Generating RSA keys.... [OK]
Console> (enable)
Task
Command
Open a Telnet session with a remote host.
telnet
host
[
port
]
Task
Command
Create the RSA host key.
set crypto key rsa
nbits
[
force
]