Password Authentication : enabled.
Hostbased Authentication : disabled.
RSA Authentication : disabled.
To disable SSH server functions, use the no ip ssh server enable command.
Using SCP with SSH to Copy a Software Image
To use secure copy (SCP) to copy a software image through an SSH connection from one switch to
another, use the following commands.
1. On Switch 1, set the SSH port number (port 22 by default).
CONFIGURATION mode
ip ssh server port number
2. On Switch 1, enable SSH.
CONFIGURATION mode
ip ssh server enable
3. On Switch 2, invoke SCP.
CONFIGURATION mode
copy scp: flash:
4. On Switch 2, in response to prompts, enter the path to the desired file and enter the port number
specified in Step 1.
EXEC Privilege mode
Example of Using SCP to Copy from an SSH Server on Another Switch
Other SSH-related commands include:
• crypto key generate: generate keys for the SSH server.
• debug ip ssh: enables collecting SSH debug information.
• ip scp topdir: identify a location for files used in secure copy transfer.
• ip ssh authentication-retries: configure the maximum number of attempts that should be
used to authenticate a user.
• ip ssh connection-rate-limit: configure the maximum number of incoming SSH connections
per minute.
• ip ssh hostbased-authentication enable: enable host-based authentication for the SSHv2
server.
• ip ssh key-size: configure the size of the server-generated RSA SSHv1 key.
• ip ssh password-authentication enable: enable password authentication for the SSH server.
• ip ssh pub-key-file: specify the file the host-based authentication uses.
• ip ssh rhostsfile: specify the rhost file the host-based authorization uses.
• ip ssh rsa-authentication enable: enable RSA authentication for the SSHv2 server.
• ip ssh rsa-authentication: add keys for the RSA authentication.
• show crypto: display the public part of the SSH host-keys.
• show ip ssh client-pub-keys: display the client public keys used in host-based authentication.
• show ip ssh rsa-authentication: display the authorized-keys for the RSA authentication.
The following example shows the use of SCP and SSH to copy a software image from one switch running
SSH server on UDP port 99 to the local switch.
Security
809