Configuring the Switch for Secure Shell
3.
4.
Beginning in privileged EXEC mode, follow these steps to configure a hostname and an IP domain name
and to generate an RSA key pair. This procedure is required if you are configuring the switch as an SSH
server.
Command
Step 1
configure terminal
Step 2
hostname hostname
Step 3
ip domain-name domain_name
Step 4
crypto key generate rsa
Step 5
end
Step 6
show ip ssh
or
show ssh
Step 7
copy running-config startup-config
To delete the RSA key pair, use the crypto key zeroize rsa global configuration command. After the
RSA key pair is deleted, the SSH server is automatically disabled.
Configuring the SSH Server
Beginning in privileged EXEC mode, follow these steps to configure the SSH server:
Command
Step 1
configure terminal
Step 2
ip ssh version [1 | 2]
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
6-48
Generate an RSA key pair for the switch, which automatically enables SSH. Follow this procedure
only if you are configuring the switch as an SSH server.
Configure user authentication for local or remote access. This step is required. For more
information, see the
"Configuring the Switch for Local Authentication and Authorization" section
on page
6-44.
Purpose
Enter global configuration mode.
Configure a hostname for your switch.
Configure a host domain for your switch.
Enable the SSH server for local and remote authentication on the switch
and generate an RSA key pair.
We recommend that a minimum modulus size of 1024 bits.
When you generate RSA keys, you are prompted to enter a modulus
length. A longer modulus length might be more secure, but it takes longer
to generate and to use.
Return to privileged EXEC mode.
Show the version and configuration information for your SSH server.
Show the status of the SSH server on the switch.
(Optional) Save your entries in the configuration file.
Purpose
Enter global configuration mode.
(Optional) Configure the switch to run SSH Version 1 or SSH Version 2.
If you do not enter this command or do not specify a keyword, the SSH
server selects the latest SSH version supported by the SSH client. For
example, if the SSH client supports SSHv1 and SSHv2, the SSH server
selects SSHv2.
1—Configure the switch to run SSH Version 1.
•
2—Configure the switch to run SSH Version 2.
•
Chapter 6
Configuring Switch-Based Authentication
OL-13270-06