Configuring Secure Shell (SSH)
Configuring the Switch for SSH Operation
Phonetic "Hash" of Switch’s Public Key
Hexadecimal "Fingerprints" of the Same Switch
Figure
The two commands shown in figure
4.Enable SSH on the Switch and Anticipate SSH Client Contact Behavior
The ip ssh command enables or disables SSH on the switch and modifies parameters the switch uses for transactions with clients. After you enable SSH, the switch can authenticate itself to SSH clients.
Note | Before enabling SSH on the switch you must generate the switch’s public/ |
| private key pair. If you have not already done so, refer to “2. Generate the |
| |
| When configured for SSH, the switch uses its host |
| itself to SSH clients. If you also want SSH clients to authenticate themselves |
| to the switch you must configure SSH on the switch for client |
| authentication at the login (Operator) level. To enhance security, you should |
| also configure local, TACACS+, or RADIUS authentication at the enable |
| (Manager) level. |
| Refer to “5. Configure the Switch for SSH Authentication” on page |
|
|