NOTE: “Zeroizing” the switch’s server host certificate or key automatically disables SSL (sets web-management ssl to No). Thus, if you zeroize the server host certificate or key and then generate a new key and server certificate, you must also re-enable SSL with the web-management ssl command before the switch can resume SSL operation. Configuring key lengths: The crypto key generate ssh command allows you to specify the type and length of the generated host key. The size of the host key is platform-dependent as different switches have different amounts of processing power. The size is represented by the parameter and has the values shown in.The default value is used if keysize is not specified. How to configure SSH on Cisco IOS. (config)#crypto key generate rsa The name for the keys will be: R1.NETWORKLESSONS.LOCAL Choose the size of the key modulus in the range of 360 to 4096 for your General Purpose Keys. Choosing a key modulus greater than 512 may take a few minutes. SSH is a secure method for remote access to your router. How to enable HTTPS/SSH and disable HTTP/Telnet for switch management on PowerConnect 5500 series switches This article provides the steps necessary to restrict management access to. Oct 02, 2015 SSH Config and crypto key generate RSA command. Use this command to generate RSA key pairs for your Cisco device (such as a router). Keys are generated in pairs–one public RSA key and one private RSA key. If your router already has RSA keys when you issue this command, you will be warned and prompted to replace the existing keys with new keys.
Q: I have a Cisco switch in my network, which I can access by hooking up a console cable directly to the device. I like to access the switch remotely using SSH. How can I enable ssh on my Cisco 3750 Catalyst Switch?
A: By default, when you configure a Cisco device, you have to use the console cable and connect directly to the system to access it. Follow the steps mentioned below, which will enable SSH access to your Cisco devices. Once you enable SSH, you can access it remotely using PuTTY or any other SSH client.
A: By default, when you configure a Cisco device, you have to use the console cable and connect directly to the system to access it. Follow the steps mentioned below, which will enable SSH access to your Cisco devices. Once you enable SSH, you can access it remotely using PuTTY or any other SSH client.
1. Setup Management IP
First, make sure you have performed basic network configurations on your switch. For example, assign default gateway, assign management ip-address, etc. If this is already done, skip to the next step.
![Crypto key generate on switch box Crypto key generate on switch box](/uploads/1/2/6/0/126011842/576884315.png)
In the following example, the management ip address is set as 192.168.101.2 in the 101 VLAN. The default gateway points to the firewall, which is 192.168.101.1
2. Set hostname and domain-name
Next, make sure the switch has a hostname and domain-name set properly.
3. Generate the RSA Keys
The switch or router should have RSA keys that it will use during the SSH process. So, generate these using crypto command as shown below.
Also, if you are running on an older Cisco IOS image, it is highly recommended that you upgrade to latest Cisco IOS.
4. Setup the Line VTY configurations
Setup the following line vty configuration parameters, where input transport is set to SSH. Set the login to local, and password to 7.
If you have not set the console line yet, set it to the following values.
5. Create the username password
![Key Key](/uploads/1/2/6/0/126011842/718740173.png)
If you don’t have an username created already, do it as shown below.
Note: If you don’t have the enable password setup properly, do it now.
Make sure the password-encryption service is turned-on, which will encrypt the password, and when you do “sh run”, you’ll seee only the encrypted password and not clear-text password.
5. Verify SSH access
From the switch, if you do ‘sh ip ssh’, it will confirm that the SSH is enabled on this cisco device.
After the above configurations, login from a remote machine to verify that you can ssh to this cisco switch.
In this example, 192.168.101.2 is the management ip-address of the switch.
> Add your comment
If you enjoyed this article, you might also like..
Next post: How to Backup Oracle Database using RMAN (with Examples)
Previous post: How to Use C++ Single and Multiple Inheritance with an Example
Learning has never been so easy!
This How-To guide will walk you through setting up (configuring and enabling) SSH on a HP ProCurve Switch using the Web Interface.
It assumes you can access the switch via the web interface and have read-write access.
This walkthrough does NOT implement Client Public Key Authentication and has the Switch Authenticate against itself.
It assumes you can access the switch via the web interface and have read-write access.
This walkthrough does NOT implement Client Public Key Authentication and has the Switch Authenticate against itself.
Crypto Key Generate On Switch Box
4 Steps total
Step 1: Log into the Switch
Log into the switch's Web interface using an account with read-write permissions.
Step 2: Create a Certificate
Note: This step will create a self-signed certificate but you can also create a request and have your Enterprise CA sign it if your environment has it available.
On the Security Tab, Select Create Certificate/ Create Request.
Select Self-Signed from the drop down box and fill in the appropriate fields.
be sure the Validity start and end dates are current.
Select Self-Signed from the drop down box and fill in the appropriate fields.
be sure the Validity start and end dates are current.
Click Apply Changes to create the certificate.
Step 3: Generate a Private/Public Key pair
Navigate over to the Configuration Tab
Click on 'telnet session to the switch console.' - This will open a black command prompt looking window.
Press any key to continue
Type in your username
Type in your password
Type in 'config' (This is the step it is left out of most other directions)
Type in 'crypto key generate ssh'
The switch will now generate a key.
If this step fails, verify your are in 'config'mode
Click on 'telnet session to the switch console.' - This will open a black command prompt looking window.
Press any key to continue
Type in your username
Type in your password
Type in 'config' (This is the step it is left out of most other directions)
Type in 'crypto key generate ssh'
The switch will now generate a key.
If this step fails, verify your are in 'config'mode
Step 4: Enable SSH
Crypto Key Generate On Switch Key
Now that you have created a certificate and the appropriate keys, you can enable SSH on the switch.
Type in 'ip ssh' in the Telnet CLI.
Thats it. SSH should now be enabled.
Thats it. SSH should now be enabled.
You can verify its enabled by typing in 'show ip ssh'
After following these instructions, you should have been sucessfully able to configure and enable SSH on your HP ProCurve Switch. The steps and screenshot in this How-To were completed using the latest Firmware for that switch 'N.11.48'.
You should now be able to have Spiceworks scan your switches using SSH which will allow spiceworks to monitor and backup their configuration.
You should now be able to have Spiceworks scan your switches using SSH which will allow spiceworks to monitor and backup their configuration.
Published: Sep 07, 2011 · Last Updated: Sep 21, 2017
References
- HP Access Security Guide
5 Comments
Microsoft Crypto Keys
- PoblanoTeBear Dec 10, 2013 at 04:24pmI found there is no need for Step 1 or Step 2Telnet into switch and run following commands:>enable
>config
>crypto key generate sshSeems to do the trick. looks like ssh is enabled out of the box (Step 4) on Procurve though you need to generate the key to be able to use it. - SerranoBoJlk Jan 6, 2014 at 07:49amThanks for the steps.
you must crypto key generate ssh in config mode before enabling SSH on your switch.
Step 2 - Create a Certificate helpfull if you want to access with HTTPS to your switch. - SerranoFelix_da_CAT5 May 16, 2014 at 08:03amisnt it necessary to save the configuration after any alteration in order to keep working after a reboot?
- CayenneNathan Bareham Aug 2, 2014 at 07:22pmi can scan, but the config does not seem to be backing up. any ideas?
- ChipotleDr-Drew Nov 25, 2015 at 10:00pmAlways a good idea to 'write mem' when your done in the CLI.... :o)