Configuring Access Security
Access Security Configurations
User Guide
523
Step 9
end
Return to privileged EXEC mode.
Step 10
copy running-config startup-config
Save the settings in the configuration file.
Note:
It will take a long time to download the key file. Please wait without any operation.
The following example shows how to configure the SSH function. Set the version as SSH
V1 and SSH V2. Enable the AES128-CBC and Cast128-CBC encryption algorithm. Enable
the HMAC-MD5 data integrity algorithm. Choose the key type as SSH-2 RSA/DSA.
Switch(config)#ip ssh server
Switch(config)#ip ssh version
v1
Switch(config)#ip ssh version
v2
Switch(config)#ip ssh timeout
100
Switch(config)#ip ssh max-client
4
Switch(config)#ip ssh algorithm
AES128-CBC
Switch(config)#ip ssh algorithm
Cast128-CBC
Switch(config)#ip ssh algorithm
HMAC-MD5
Switch(config)#ip ssh download
v2 publickey
ip-address
192.168.0.100
Start to download SSH key file...
Download SSH key file OK.
Switch(config)#show ip ssh
Global Config:
SSH Server: Enabled
Protocol V1: Enabled
Protocol V2: Enabled
Idle Timeout: 100
MAX Clients: 4
Port: 22
Encryption Algorithm:
AES128-CBC: Enabled
Downloaded from