Configuring Secure Shell (SSH)
Steps for Configuring and Using SSH for Switch and Client Authentication
B. Switch Preparation
1.Assign a login (Operator) and enable (Manager) password on the switch (page
2.Generate a public/private key pair on the switch (page
You need to do this only once. The key remains in the switch even if you reset the switch to its
3.Copy the switch’s public key to the SSH clients you want to access the switch (page
4.Enable SSH on the switch (page
5.Configure the primary and secondary authentication methods you want the switch to use. In all cases, the switch will use its
•SSH Login (Operator) options:
–Option A:
Primary: Local, TACACS+, or RADIUS password
Secondary: Local password or none. If the primary method is local, the secondary method cannot be local.
– Option B:
Primary: Client
Secondary: None
Note that if you want the switch to perform client
• SSH Enable (Manager) options:
Primary: Local, TACACS+, or RADIUS
Secondary: Local password or none. If the primary method is local, the secondary method cannot be local.
6.Use your SSH client to access the switch using the switch’s IP address or DNS name (if allowed by your SSH client application). Refer to the documentation provided with the client application.