Configuring Secure Shell SSH
Configuring Secure Shell SSH
and commercially available SSH servers. The SSH client supports the ciphers of Data Encryption Standard
(DES), 3DES, and password authentication.
Note The SSH client functionality is available only when the SSH server is enabled.
User authentication is performed like that in the Telnet session to the device. SSH also supports the following
user authentication methods:
• TACACS+
• RADIUS
• Local authentication and authorization
Note When using SCP, you cannot enter the password into the copy command. You must enter the password when
prompted.
Procedure
Device> enable
Device(config)# ip domain-name
your_domain
Step 5 crypto key generate rsa Enables the SSH server for local and remote
authentication on the Device and generates an
Example:
RSA key pair. Generating an RSA key pair for
the Device automatically enables SSH.
Device(config)# crypto key generate rsa
We recommend that a minimum modulus size
of 1024 bits.
When you generate RSA keys, you are
prompted to enter a modulus length. A longer
modulus length might be more secure, but it
takes longer to generate and to use.
Note Follow this procedure only if you are
configuring the Device as an SSH
server.
Device(config)# end
Note This procedure is only required if you are configuring the Device as an SSH server.
Procedure
Device> enable
Step 3 ip ssh version [2] (Optional) Configures the Device to run SSH
Version 2.
Example:
If you do not enter this command or do not
Device(config)# ip ssh version 2 specify a keyword, the SSH server selects the
latest SSH version supported by the SSH client.
Step 4 ip ssh {time-out seconds | authentication-retries Configures the SSH control parameters:
number}
• time-out seconds: Specify the time-out
Example: value in seconds; the default is 120
seconds. The range is 0 to 120 seconds.
Device(config)# ip ssh time-out 90 This parameter applies to the SSH
OR negotiation phase. After the connection is
Device(config)# ip ssh
established, the Device uses the default
authentication-retries 2
time-out values of the CLI-based sessions.
By default, up to five simultaneous,
encrypted SSH connections for multiple
CLI-based sessions over the network are
available (session 0 to session 4). After the
execution shell starts, the CLI-based
session time-out value returns to the
default of 10 minutes.
• authentication-retries number: Specify the
number of times that a client can
re-authenticate to the server. The default
is 3; the range is 0 to 5.
Device(config-line)# end
Step 7 Use one of the following: • Shows the version and configuration
information for your SSH server.
• show ip ssh
• show ssh • Shows the status of the SSH server
connections on the Device.
Example:
Device# show ip ssh
or
Device# show ssh
Table 1: Commands for Displaying the SSH Server Configuration and Status
Command Purpose
show ip Shows the version and configuration information for the SSH server.
ssh
Secure Shell Cisco IOS XE Everest SSH is a protocol that provides a secure, remote
16.6.1 connection to a device. SSH provides more security
for remote connections than Telnet does by providing
strong encryption when a device is authenticated.
This software release supports SSHv2.