Users Guide

The following example uses the ip ssh server version 2 command to enable SSH version 2 and the show ip ssh
command to confirm the setting.
DellEMC(conf)#ip ssh server version 2
DellEMC(conf)#do show ip ssh
SSH server : enabled.
SSH server version : v2.
SSH server vrf : default.
SSH server ciphers : 3des-cbc,aes128-cbc,aes192-cbc,aes256-cbc,aes128-ctr,aes192-
ctr,aes256-ctr.
SSH server macs : hmac-md5,hmac-md5-96,hmac-sha1,hmac-sha1-96,hmac-
sha2-256,hmac-sha2-256-96.
SSH server kex algorithms : diffie-hellman-group-exchange-sha1,diffie-hellman-group1-
sha1,diffie-hellman-group14-sha1.
Password Authentication : enabled.
Hostbased Authentication : disabled.
RSA Authentication : disabled.
Vty Encryption HMAC Remote IP
DellEMC(conf)#
To disable SSH server functions, use the no ip ssh server enable command.
Using SCP with SSH to Copy a Software Image
To use secure copy (SCP) to copy a software image through an SSH connection from one switch to another, use the following
commands.
1. On Switch 1, set the SSH port number ( port 22 by default).
CONFIGURATION MODE
ip ssh server port number
2. On Switch 1, enable SSH.
CONFIGURATION MODE
copy ssh server enable
3. On Switch 2, invoke SCP.
CONFIGURATION MODE
copy scp: flash:
4. On Switch 2, in response to prompts, enter the path to the desired file and enter the port number specified in Step 1.
EXEC Privilege Mode
5. On the chassis, invoke SCP.
CONFIGURATION mode
copy scp: flash:
The following example shows the use of SCP and SSH to copy a software image from one switch running SSH server on UDP
port 99 to the local switch.
Other SSH related command include:
crypto key generate : generate keys for the SSH server.
debug ip ssh : enables collecting SSH debug information.
ip scp topdir : identify a location for files used in secure copy transfer.
ip ssh authentication-retries : configure the maximum number of attempts that should be used to authenticate a
user.
ip ssh connection-rate-limit : configure the maximum number of incoming SSH connections per minute.
ip ssh hostbased-authentication enable : enable host-based authentication for the SSHv2 server.
ip ssh password-authentication enable : enable password authentication for the SSH server.
ip ssh pub-key-file : specify the file the host-based authentication uses.
ip ssh rhostsfile : specify the rhost file the host-based authorization uses.
ip ssh rsa-authentication enable : enable RSA authentication for the SSHv2 server.
ip ssh rsa-authentication : add keys for the RSA authentication.
show crypto : display the public part of the SSH host-keys.
Security
827