How to Configure Secure Shell Version 2 Support
Command or Action
Step 12
configure terminal
Example:
host1# configure terminal
Step 13
ip ssh stricthostkeycheck
Example:
host1(config)# ip ssh stricthostkeycheck
Starting an Encrypted Session with a Remote Device
Note
The device with which you want to connect must support a Secure Shell (SSH) server that has an encryption
algorithm that is supported in Cisco software. Also, you need not enable your device. SSH can be run in
disabled mode.
SUMMARY STEPS
1. ssh [-v {1 | 2} | -c {aes128-ctr | aes192-ctr | aes256-ctr | aes128-cbc | 3des | aes192-cbc | aes256-cbc} |
-l user-id | -l user-id:vrf-name number ip-address ip-address | -l user-id:rotary number ip-address | -m
{hmac-md5-128 | hmac-md5-96 | hmac-sha1-160 | hmac-sha1-96} | -o numberofpasswordprompts
n | -p port-num] {ip-addr | hostname} [command | -vrf]
DETAILED STEPS
Command or Action
Step 1
ssh [-v {1 | 2} | -c {aes128-ctr | aes192-ctr | aes256-ctr | aes128-cbc | 3des | aes192-cbc
| aes256-cbc} | -l user-id | -l user-id:vrf-name number ip-address ip-address | -l
user-id:rotary number ip-address | -m {hmac-md5-128 | hmac-md5-96 |
hmac-sha1-160 | hmac-sha1-96} | -o numberofpasswordprompts n | -p port-num]
{ip-addr | hostname} [command | -vrf]
Example:
Device# ssh -v 2 -c aes256-ctr -m hmac-sha1-96 -l user2 10.76.82.24
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(4)E (Catalyst 2960-X Switches)
1100
Purpose
Enters global configuration mode.
Ensures that server authentication takes place.
• The connection is terminated in case of a failure.
• Use no hostname command to return to the default host.
Purpose
Starts an encrypted session with a
remote networking device.