Cisco Systems 312 Switch User Manual


  Open as PDF
of 1216
 
7-37
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
OL-12189-01
Chapter 7 Configuring Switch-Based Authentication
Configuring the Switch for Secure Shell
To disable AAA, use the no aaa new-model global configuration command. To disable authorization,
use the no aaa authorization {network | exec} method1 global configuration command.
Note To secure the switch for HTTP access by using AAA methods, you must configure the switch with the
ip http authentication aaa global configuration command. Configuring AAA authentication does not
secure the switch for HTTP access by using AAA methods.
For more information about the ip http authentication command, see the Cisco IOS Security Command
Reference, Release 12.2.
Configuring the Switch for Secure Shell
This section describes how to configure the Secure Shell (SSH) feature. To use this feature, you must
install the cryptographic (encrypted) software image on your switch.You can download the
cryptographic software image from www.ibm.com/support. For more information, see the release notes
for this release.
These sections contain this information:
Understanding SSH, page 7-37
Configuring SSH, page 7-39
Displaying the SSH Configuration and Status, page 7-41
For SSH configuration examples, see the “SSH Configuration Examples” section in the “Configuring
Secure Shell” chapter of the Cisco IOS Security Configuration Guide, Cisco IOS Release 12.2, at
this URL:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_chapter0918
6a00800ca7d5.html
Note For complete syntax and usage information for the commands used in this section, see the command
reference for this release and the command reference for Cisco IOS Release 12.2 at this URL:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_command_reference_book09186a
0080087e33.html
Understanding SSH
SSH is a protocol that provides a secure, remote connection to a device. SSH provides more security for
remote connections than Telnet does by providing strong encryption when a device is authenticated. This
software release supports SSH Version 1 (SSHv1) and SSH Version 2 (SSHv2).
Step 8
show running-config Verify your entries.
Step 9
copy running-config startup-config (Optional) Save your entries in the configuration file.
Command Purpose