12-07-2022 06:14 AM
hi team,
how to enable the SSH on cisco catalyst 2960 switch.
12-07-2022 09:29 AM
- FYI : https://www.cisco.com/c/en/us/support/docs/security-vpn/secure-shell-ssh/4145-ssh.html
M.
12-07-2022 09:33 AM
check what version of code running and follow below guide :
12-08-2022 07:44 AM
hi team,
i want configure the SSH on client switch(2960) and want to know the difference b/w login switch using TELNET and SSH(switch using in client mode)
12-08-2022 07:58 AM
configuring ssh look at the guide i was reffered before.
Telnet run port 23 - not secure
ssh run on port 22 is more secure
switch using in client mode - you mean you using switch act as client to connect other devices ?
12-08-2022 10:08 PM
Yes
12-09-2022 02:31 AM
i still stand same, SSH is more secure.
12-11-2022 11:14 PM
In the course of this discussion the original poster has asked 2 questions. The first question was about how to enable ssh on a 2960. The first step in enabling ssh is to determine whether the 2960 supports encryption. In the output of show version look for the image name. Does the image name include "k9"? If so the switch does support encryption, and if not the switch does not support encryption and you will not be able to enable ssh.
If the device does support encryption then you will need to generate an RSA key. To enable an RSA key you will need to configure a device name different from the default device name and to configure a domain name different from the default. After you do these you can generate an RSA key and ssh will be enabled.
The second question was about using the 2960 as a client for ssh "and want to know the difference b/w login switch using TELNET and SSH(switch using in client mode)" Once ssh is enabled then a user on the switch could initiate remote connections to other devices using either telnet or ssh. If using ssh then one condition is that the remote device must have ssh enabled and must accept ssh protocol connections. If using telnet then one condition is that the remote device must accept telnet connections. Using either protocol to connect to remote devices the user must have a user name and password that the remote device would authenticate. From the user perspective there is no difference between using telnet to connect to a remote device or using ssh to connect to the remote device. From an operational perspective the difference is that the ssh traffic will be encrypted and the telnet traffic will be clear text. If someone might be able to sniff the traffic this difference could be significant.
12-08-2022 08:03 AM
- Summarizing : SSH is much more secure because then the data between the ssh-client and the switch are encrypted in contrast to Telnet ,
M.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide