Software Configuration Guide
Page 10
...32 Configuring the Switch for Secure Shell 9-33 Understanding SSH 9-33 SSH Servers, Integrated Clients, and Supported Versions 9-33 Limitations 9-34 Configuring SSH 9-34 Configuration Guidelines 9-34 Cryptographic Software Image Guidelines 9-35 Setting Up the Switch to Run SSH 9-35 Configuring the SSH Server 9-36 Displaying the SSH Configuration and Status... Default 802.1x Configuration 10-9 802.1x Configuration Guidelines 10-10 Upgrading from a Previous Software Release 10-11 Enabling 802.1x Authentication 10-11 Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide x 78-11380-10
...32 Configuring the Switch for Secure Shell 9-33 Understanding SSH 9-33 SSH Servers, Integrated Clients, and Supported Versions 9-33 Limitations 9-34 Configuring SSH 9-34 Configuration Guidelines 9-34 Cryptographic Software Image Guidelines 9-35 Setting Up the Switch to Run SSH 9-35 Configuring the SSH Server 9-36 Displaying the SSH Configuration and Status... Default 802.1x Configuration 10-9 802.1x Configuration Guidelines 10-10 Upgrading from a Previous Software Release 10-11 Enabling 802.1x Authentication 10-11 Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide x 78-11380-10
Software Configuration Guide
Page 65
The switch must have an enable secret password configured. For information about configuring the switch for Telnet access, see the "Configuring the Switch for Secure Shell" section on page 2-7. After you do not need to connect a terminal or PC to the switch console port and power on...output or if you can establish a connection with the Telnet or SSH client, and the switch must first be configured for a Terminal Line" section on the management station. 78-11380-10 Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide 2-9 This example shows how to see the "...
The switch must have an enable secret password configured. For information about configuring the switch for Telnet access, see the "Configuring the Switch for Secure Shell" section on page 2-7. After you do not need to connect a terminal or PC to the switch console port and power on...output or if you can establish a connection with the Telnet or SSH client, and the switch must first be configured for a Terminal Line" section on the management station. 78-11380-10 Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide 2-9 This example shows how to see the "...
Software Configuration Guide
Page 192
...exhausted. 9-12 Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide 78-11380-10 When the connection is not authenticated. TACACS+ allows a dialog between the daemon and the switch. The user can use an alternative method for TACACS+ authentication. Telnet, Secure Shell (SSH), rlogin, ... authentication, the user undergoes an additional authorization phase if authorization has been enabled on users; ERROR-An error occurred at this process occurs: 1. You can access: - If the switch is returned, the response contains data in the form of these responses ...
...exhausted. 9-12 Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide 78-11380-10 When the connection is not authenticated. TACACS+ allows a dialog between the daemon and the switch. The user can use an alternative method for TACACS+ authentication. Telnet, Secure Shell (SSH), rlogin, ... authentication, the user undergoes an additional authorization phase if authorization has been enabled on users; ERROR-An error occurred at this process occurs: 1. You can access: - If the switch is returned, the response contains data in the form of these responses ...
Software Configuration Guide
Page 199
...The user is either not authenticated and is prompted to a non-Cisco device if the non-Cisco device requires authentication. • Networks using a variety of these events...enabled. RADIUS does not support AppleTalk Remote Access (ARA), NetBIOS Frame Control Protocol (NBFCP), NetWare Asynchronous Services Interface (NASI), or X.25 PAD connections. • Switch-to-switch or router-to a switch... SSH, rlogin, or privileged EXEC services • Connection parameters, including the host or client IP address, access list, and user timeouts 78-11380-10 Catalyst 2950 and Catalyst 2955 Switch ...
...The user is either not authenticated and is prompted to a non-Cisco device if the non-Cisco device requires authentication. • Networks using a variety of these events...enabled. RADIUS does not support AppleTalk Remote Access (ARA), NetBIOS Frame Control Protocol (NBFCP), NetWare Asynchronous Services Interface (NASI), or X.25 PAD connections. • Switch-to-switch or router-to a switch... SSH, rlogin, or privileged EXEC services • Connection parameters, including the host or client IP address, access list, and user timeouts 78-11380-10 Catalyst 2950 and Catalyst 2955 Switch ...
Software Configuration Guide
Page 215
... software image, your switch configuration must be more secure, but it can have up to eight cluster members. This step is required. Chapter 9 Configuring Switch-Based Authentication Configuring the Switch for Secure Shell Cryptographic Software Image Guidelines These guidelines apply only to non-LRE Catalyst 2950 switches: The SSH feature uses a large amount of switch memory, which automatically enables SSH.
... software image, your switch configuration must be more secure, but it can have up to eight cluster members. This step is required. Chapter 9 Configuring Switch-Based Authentication Configuring the Switch for Secure Shell Cryptographic Software Image Guidelines These guidelines apply only to non-LRE Catalyst 2950 switches: The SSH feature uses a large amount of switch memory, which automatically enables SSH.
Software Configuration Guide
Page 702
... 28-16 system contact and location 28-14 trap manager, configuring 28-12 traps described 28-3, 28-5 differences from informs 28-5 enabling 28-11 enabling MAC address notification 8-24 overview 28-1, 28-4 types of 28-11 users 28-9 versions supported 28-2 snooping, IGMP 21-1 SNR... Tree Protocol See STP speed configuring on interfaces 11-10 setting on CPE devices 13-11 SSH configuring 9-34 cryptographic software image 9-33 described 9-33 encryption methods 9-33 user authentication methods, supported 9-34 IN-26 Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide 78-11380-10
... 28-16 system contact and location 28-14 trap manager, configuring 28-12 traps described 28-3, 28-5 differences from informs 28-5 enabling 28-11 enabling MAC address notification 8-24 overview 28-1, 28-4 types of 28-11 users 28-9 versions supported 28-2 snooping, IGMP 21-1 SNR... Tree Protocol See STP speed configuring on interfaces 11-10 setting on CPE devices 13-11 SSH configuring 9-34 cryptographic software image 9-33 described 9-33 encryption methods 9-33 user authentication methods, supported 9-34 IN-26 Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide 78-11380-10