Cisco Systems 310 Switch User Manual


  Open as PDF
of 1216
 
7-39
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
OL-12189-01
Chapter 7 Configuring Switch-Based Authentication
Configuring the Switch for Secure Shell
Configuring SSH
This section has this configuration information:
Configuration Guidelines, page 7-39
Setting Up the Switch to Run SSH, page 7-39 (required)
Configuring the SSH Server, page 7-40 (required only if you are configuring the switch as an SSH
server)
Configuration Guidelines
Follow these guidelines when configuring the switch as an SSH server or SSH client:
An RSA key pair generated by a SSHv1 server can be used by an SSHv2 server, and the reverse.
If the SSH server is running on a stack master and the stack master fails, the new stack master uses
the RSA key pair generated by the previous stack master.
If you get CLI error messages after entering the crypto key generate rsa global configuration
command, an RSA key pair has not been generated. Reconfigure the hostname and domain, and then
enter the crypto key generate rsa command. For more information, see the “Setting Up the Switch
to Run SSH” section on page 7-39.
When generating the RSA key pair, the message No host name specified might appear. If it does,
you must configure a hostname by using the hostname global configuration command.
When generating the RSA key pair, the message No domain specified might appear. If it does, you
must configure an IP domain name by using the ip domain-name global configuration command.
When configuring the local authentication and authorization authentication method, make sure that
AAA is disabled on the console.
Setting Up the Switch to Run SSH
Follow these steps to set up your switch to run SSH:
1. Download the cryptographic software image from www.ibm.com/support. This step is required. For
more information, see the release notes for this release.
2. Configure a hostname and IP domain name for the switch. Follow this procedure only if you are
configuring the switch as an SSH server.
3. Generate an RSA key pair for the switch, which automatically enables SSH. Follow this procedure
only if you are configuring the switch as an SSH server.
4. Configure user authentication for local or remote access. This step is required. For more
information, see the “Configuring the Switch for Local Authentication and Authorization” section
on page 7-36.
Beginning in privileged EXEC mode, follow these steps to configure a hostname and an IP domain name
and to generate an RSA key pair. This procedure is required if you are configuring the switch as an SSH
server.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
hostname hostname Configure a hostname for your switch.