Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

SSH on cisco switch

Posted on 2008-06-22
4
Medium Priority
?
6,330 Views
Last Modified: 2012-06-21
How do you put ssh on a cisco 3750 G switch?
0
Comment
Question by:Paktusjet
  • 2
4 Comments
 
LVL 14

Accepted Solution

by:
agriesser earned 500 total points
ID: 21840667
Usually the only thing todo is to generate the necessary RSA keys. After the keys have been generated, SSH will go online (if available on the IOS version of this switch).

For 3550, 3560 series of switches, the command would be:

crypto key generate rsa general-keys modulus 768

For the 2950, 2960 series the command is slightly different:

crypto key generate rsa usage-keys modulus 768
0
 
LVL 1

Expert Comment

by:Net-P
ID: 21853705
First: For SSH support on Catalyst switches an IOS Version with crypto feature set is required.

With running crypto IOS you have to configure an domain-name for the switch:
ip domain-name yourdomain.tld

generate a rsa key:
crypto key generate rsa

enabling ssh version 2:
ip ssh version 2

add a local user :
username cisco privilege 15 password password

configure vty lines:
line vty 0 15
 login local
 transport input ssh
0
 
LVL 14

Expert Comment

by:agriesser
ID: 21924191
Did it work?
0
 
LVL 2

Author Comment

by:Paktusjet
ID: 21936217
yes it worked, thank you :)
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hello to you all, I hear of many people congratulate AWS (Amazon Web Services) on how easy it is to spin up and create new EC2 (Elastic Compute Cloud) instances, but then fail and struggle to connect to them using simple tools such as SSH (Secure…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…
Suggested Courses

926 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question