Chapter31 Router Properties
vty Settings
31-22
Cisco Router and Security Device Manager 2.5 User’s Guide
OL-4015-12
Error Message
SDM Warning: Current Host Not Allowed
Explanation This message is displayed if you have not configured a
management access policy to allow the current host or network to access
Cisco SDM on this router.
Recommended Action You should create such a policy in order to make Cisco
SDM on this router accessible from the current host or network. If you do not,
you will lose the connection to the router when you deliver the configuration
to the router. Click Yes to add to a management access policy now for the
current host or network. Click No to proceed without adding a policy for the
current host or network. You will lose contact with the router during
command delivery, and you will have to log in to Cisco SDM using a different
host or network.
SSH
This router implements Secure Shell (SSH) Server, a feature that enables an SSH
client to make a secure, encrypted connection to a Cisco router. This connection
provides functionality similar to that of an inbound Telnet connection, but which
provides strong encryption to be used with Cisco IOS software a uthentication.
The SSH server in Cisco IOS software will work with publicly and commercially
available SSH cl ients. This feature is disabled if the router is not using an IPsec DES
or 3DES Cisco IOS release, and if the SSH branch of the Additional Tasks tree does
not appear.
SSH uses an RSA cryptographic key to encrypt data traveling between the router
and the SSH client. Generating the RSA key in this window enables SSH
communication between the router and the SSH clients.

Status Messages

Crypto key is not set on this device
Appears if there is no cryptographic key configured for the device. If there is no
key configured, you can enter a modulus size and generate a key.
RSA key is set on this router
Appears if a cryptographic key was generated. SSH is enabled on this route r.