Secure Shell (SSH) is a protocol that provides a secure remote connection to specific network devices. This connection provides functionality that is similar to a Telnet connection, except that it is encrypted. SSH allows the administrator to configure the switch through the command line interface (CLI) with a third party program.
The switch acts as an SSH client that provides SSH capabilities to the users within the network. The switch uses an SSH server to provide SSH services. When SSH server authentication is disabled, the switch takes any SSH server as trusted, which decreases security on your network. If SSH service is enabled on the switch, security is enhanced.
This article provides instructions on how to configure server authentication on a managed switch through the CLI.
Step 1. Log in to the switch console. The default username and password is cisco/cisco. If you have configured a new username or password, enter the credentials instead.
Note: To learn how to access an SMB switch CLI through SSH or Telnet, click here.
Note: The commands may vary depending on the exact model of your switch. In this example, the SG350X switch is accessed through Telnet.
Step 2. From the Privileged EXEC mode of the switch, enter the Global Configuration mode by entering the following:
Step 3. To enable remote SSH server authentication by the SSH client, enter the following:
SG350X(config)#ip ssh-client server authenticationStep 4. To specify the source interface which IPv4 address will be used as the Source IPv4 address for communication with IPv4 SSH servers, enter the following:
SG350X(config)#ip ssh-client source-interface [interface-id]Note: In this example, the source interface is VLAN 20.
Step 5. (Optional) To specify the source interface whose IPv6 address will be used as the Source IPv6 address for communication with IPv6 SSH servers, enter the following:
SG350X(config)#ipv6 ssh-client source-interface [interface-id]Note: In this example, source IPv6 address is not configured.
Step 6. To add a trusted server to the Trusted Remote SSH Server Table, enter the following:
SG350X(config)#ip ssh-client server fingerprint [host | ip-address] [fingerprint]The parameters are:
Note: In this example, the server IP address is 192.168.100.1 and the fingerprint used is 76:0d:a0:12:7f:30:09:d3:18:04:df:77:c8:8e:51:a8.
Step 7. Enter the exit command to go back to the Privileged EXEC mode:
SG350X(config)#exitStep 8. To display the SSH server authentication settings on the switch, enter the following:
SG350X#show ip ssh-client server [host | ip-address]The parameters are:
Note: In this example, the server IP address 192.168.100.1 is entered.
Step 9. (Optional) In the Privileged EXEC mode of the switch, save the configured settings to the startup configuration file by entering the following:
SG350X#copy running-config startup-configStep 10. (Optional) Press Y for Yes or N for No on your keyboard once the Overwrite file [startup-config].... prompt appears.
You have now learned the steps to configure server authentication on a managed switch through the CLI.
Revision | Publish Date | Comments |
---|---|---|
1.0 |
13-Dec-2018 |
Initial Release |