12-21
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Chapter 12 Configuring Switch-Based Authentication
Information About Configuring Switch-Based Authentication
Secure Shell
To use this feature, you must install the cryptographic (encrypted) software image on your switch. You
must obtain authorization to use this feature and to download the cryptographic software files from
Cisco.com. For more information, see the release notes for this release.
For SSH configuration examples, see the “SSH Configuration Examples” section in the “Configuring
Secure Shell” chapter of the Cisco IOS Security Configuration Guide, Cisco IOS Release 12.2.
SSH in IPv6 functions the same and offers the same benefits as SSH in IPv4. IPv6 enhancements to SSH
consist of support for IPv6 addresses that enable a Cisco router to accept and establish secure, encrypted
connections with remote IPv6 nodes over an IPv6 transport.
Note For complete syntax and usage information for the commands used in this section, see the command
reference for this release and command reference for Ci sco IOS Release 12.2.

SSH

SSH is a protocol that provides a secure, remote connection to a device. SSH provides more security for
remote connections than Telnet does by providing strong encryption when a device is authenticated. This
software release supports SSH Version 1 (SSHv1) and SSH Version 2 (SSHv2).

SSH Servers, Integrated Clients, and Supported Versions

The SSH feature has an SSH server and an SSH integrated client, which are applications that run on the
switch. You can use an SSH client to connect to a switch running the SSH server. The SSH server works
with the SSH client supported in this release and with non-Cisco SSH clients. The SSH client also works
with the SSH server supported in this release and with non-Cisco SSH servers.
The switch supports an SSHv1 or an SSHv2 server.
The switch supports an SSHv1 client.
SSH supports the Data Encryption Standard (DES) encryption algorithm, the Triple DES (3DES)
encryption algorithm, and password-based user authentication.
SSH also supports these user authentication methods:
TACACS+ (for more information, see the “Configuring TACACS+” section on page 12-30)
RADIUS (for more information, see the “Configuring Radius Server Communication” section on
page 12-33)
Local authentication and authorization (for more information, see the “Configuring the Switch for
Local Authentication and Authorization” section on page 12 -39)
Note This software release does not suppor t IP Security (IPSec).