Software Configuration Guide
Page 10
...32 Configuring the Switch for Secure Shell 9-33 Understanding SSH 9-33 SSH Servers, Integrated Clients, and Supported Versions 9-33 Limitations 9-34 Configuring SSH 9-34 Configuration Guidelines 9-34 Cryptographic Software Image Guidelines 9-35 Setting Up the Switch to Run SSH 9-35 Configuring the SSH Server 9-36 Displaying the SSH Configuration and Status... Default 802.1x Configuration 10-9 802.1x Configuration Guidelines 10-10 Upgrading from a Previous Software Release 10-11 Enabling 802.1x Authentication 10-11 Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide x 78-11380-10
...32 Configuring the Switch for Secure Shell 9-33 Understanding SSH 9-33 SSH Servers, Integrated Clients, and Supported Versions 9-33 Limitations 9-34 Configuring SSH 9-34 Configuration Guidelines 9-34 Cryptographic Software Image Guidelines 9-35 Setting Up the Switch to Run SSH 9-35 Configuring the SSH Server 9-36 Displaying the SSH Configuration and Status... Default 802.1x Configuration 10-9 802.1x Configuration Guidelines 10-10 Upgrading from a Previous Software Release 10-11 Enabling 802.1x Authentication 10-11 Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide x 78-11380-10
Software Configuration Guide
Page 65
... recalling previous command entries, see the "Editing Commands through an SSH session, the user EXEC prompt appears on the management station. 78-11380-10 Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide 2-9 The switch supports up to a management station or dial-up modem. For... you enter | exclude output, the lines that contain output are case sensitive. If your switch is useful when you can establish a connection with your switch must have an enable secret password configured. For information about connecting to the console port, refer to see Chapter ...
... recalling previous command entries, see the "Editing Commands through an SSH session, the user EXEC prompt appears on the management station. 78-11380-10 Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide 2-9 The switch supports up to a management station or dial-up modem. For... you enter | exclude output, the lines that contain output are case sensitive. If your switch is useful when you can establish a connection with your switch must have an enable secret password configured. For information about connecting to the console port, refer to see Chapter ...
Software Configuration Guide
Page 192
... security protocols to keep accounts on a user. CONTINUE-The user is exhausted. 9-12 Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide 78-11380-10 If TACACS+ authorization is required, the TACACS+ daemon is... the daemon or in the list. TACACS+ allows a dialog between the daemon and the switch. The user can begin. Telnet, Secure Shell (SSH), rlogin, or privileged EXEC services - If an ERROR response is configured to retry the ..., the user undergoes an additional authorization phase if authorization has been enabled on the TACACS+ daemon. -
... security protocols to keep accounts on a user. CONTINUE-The user is exhausted. 9-12 Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide 78-11380-10 If TACACS+ authorization is required, the TACACS+ daemon is... the daemon or in the list. TACACS+ allows a dialog between the daemon and the switch. The user can begin. Telnet, Secure Shell (SSH), rlogin, or privileged EXEC services - If an ERROR response is configured to retry the ..., the user undergoes an additional authorization phase if authorization has been enabled on the TACACS+ daemon. -
Software Configuration Guide
Page 199
The user is enabled. The username and encrypted password are ... additional data that is denied. Chapter 9 Configuring Switch-Based Authentication Controlling Switch Access with RADIUS RADIUS is used to authenticate from one device to a non-Cisco device if the non-Cisco device requires authentication. • Networks using a ... items: • Telnet, SSH, rlogin, or privileged EXEC services • Connection parameters, including the host or client IP address, access list, and user timeouts 78-11380-10 Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide 9-19 RADIUS...
The user is enabled. The username and encrypted password are ... additional data that is denied. Chapter 9 Configuring Switch-Based Authentication Controlling Switch Access with RADIUS RADIUS is used to authenticate from one device to a non-Cisco device if the non-Cisco device requires authentication. • Networks using a ... items: • Telnet, SSH, rlogin, or privileged EXEC services • Connection parameters, including the host or client IP address, access list, and user timeouts 78-11380-10 Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide 9-19 RADIUS...
Software Configuration Guide
Page 215
... cryptographic software image from Cisco.com. For more information, refer to the release notes for the switch, which limits the number of VLANs, trunk ports, and cluster members that you are configuring the switch as an SSH server. 3. When you...or equal to 128. Chapter 9 Configuring Switch-Based Authentication Configuring the Switch for Secure Shell Cryptographic Software Image Guidelines These guidelines apply only to non-LRE Catalyst 2950 switches: The SSH feature uses a large amount of switch memory, which automatically enables SSH. Follow this condition: - Step 1 Step...
... cryptographic software image from Cisco.com. For more information, refer to the release notes for the switch, which limits the number of VLANs, trunk ports, and cluster members that you are configuring the switch as an SSH server. 3. When you...or equal to 128. Chapter 9 Configuring Switch-Based Authentication Configuring the Switch for Secure Shell Cryptographic Software Image Guidelines These guidelines apply only to non-LRE Catalyst 2950 switches: The SSH feature uses a large amount of switch memory, which automatically enables SSH. Follow this condition: - Step 1 Step...
Software Configuration Guide
Page 702
... 28-16 system contact and location 28-14 trap manager, configuring 28-12 traps described 28-3, 28-5 differences from informs 28-5 enabling 28-11 enabling MAC address notification 8-24 overview 28-1, 28-4 types of 28-11 users 28-9 versions supported 28-2 snooping, IGMP 21-1 SNR... Tree Protocol See STP speed configuring on interfaces 11-10 setting on CPE devices 13-11 SSH configuring 9-34 cryptographic software image 9-33 described 9-33 encryption methods 9-33 user authentication methods, supported 9-34 IN-26 Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide 78-11380-10
... 28-16 system contact and location 28-14 trap manager, configuring 28-12 traps described 28-3, 28-5 differences from informs 28-5 enabling 28-11 enabling MAC address notification 8-24 overview 28-1, 28-4 types of 28-11 users 28-9 versions supported 28-2 snooping, IGMP 21-1 SNR... Tree Protocol See STP speed configuring on interfaces 11-10 setting on CPE devices 13-11 SSH configuring 9-34 cryptographic software image 9-33 described 9-33 encryption methods 9-33 user authentication methods, supported 9-34 IN-26 Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide 78-11380-10