hit counter script

Starting An Encrypted Session With A Remote Device - Cisco Catalyst 2960 series Configuration Manual

Consolidated platform configuration guide, ios release 15.2(4)e
Hide thumbs Also See for Catalyst 2960 series:
Table of Contents

Advertisement

How to Configure Secure Shell Version 2 Support
Command or Action
Step 12
configure terminal
Example:
host1# configure terminal
Step 13
ip ssh stricthostkeycheck
Example:
host1(config)# ip ssh stricthostkeycheck

Starting an Encrypted Session with a Remote Device

Note
The device with which you want to connect must support a Secure Shell (SSH) server that has an encryption
algorithm that is supported in Cisco software. Also, you need not enable your device. SSH can be run in
disabled mode.
SUMMARY STEPS
1. ssh [-v {1 | 2} | -c {aes128-ctr | aes192-ctr | aes256-ctr | aes128-cbc | 3des | aes192-cbc | aes256-cbc} |
-l user-id | -l user-id:vrf-name number ip-address ip-address | -l user-id:rotary number ip-address | -m
{hmac-md5-128 | hmac-md5-96 | hmac-sha1-160 | hmac-sha1-96} | -o numberofpasswordprompts
n | -p port-num] {ip-addr | hostname} [command | -vrf]
DETAILED STEPS
Command or Action
Step 1
ssh [-v {1 | 2} | -c {aes128-ctr | aes192-ctr | aes256-ctr | aes128-cbc | 3des | aes192-cbc
| aes256-cbc} | -l user-id | -l user-id:vrf-name number ip-address ip-address | -l
user-id:rotary number ip-address | -m {hmac-md5-128 | hmac-md5-96 |
hmac-sha1-160 | hmac-sha1-96} | -o numberofpasswordprompts n | -p port-num]
{ip-addr | hostname} [command | -vrf]
Example:
Device# ssh -v 2 -c aes256-ctr -m hmac-sha1-96 -l user2 10.76.82.24
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(4)E (Catalyst 2960-X Switches)
1100
Purpose
Enters global configuration mode.
Ensures that server authentication takes place.
• The connection is terminated in case of a failure.
• Use no hostname command to return to the default host.
Purpose
Starts an encrypted session with a
remote networking device.

Advertisement

Table of Contents
loading

Table of Contents