SlideShare a Scribd company logo
SSH Configuration on switch

 WWW.TCPIPGURU.CO
        M
Configuring ssh on switch
Configuring SSH on switch:
R1>enable
R1#config t
Router(config)#hos
Router(config)#hostname R1
R1(config)#ip do
R1(config)#ip domain-n
R1(config)#ip domain-n
R1(config)#crypto key
R1(config)#crypto key gen
R1(config)#crypto key generate rs
R1(config)#crypto key generate rsa gen
R1(config)#crypto key generate rsa general-keys mo
R1(config)#crypto key generate rsa general-keys modulus 768
% The key modulus size is 768 bits
% Generating 768 bit RSA keys, keys will be non-exportable...[OK]
*Mar 1 08:45:37.633: %SSH-5-ENABLED: SSH 1.99 has been enabled
R1(config)#ip ssh time-out 60
R1(config)#ip ssh authentication-retries 3
R1(config)#username admin password 123
R1(config)#line vty 0 6
R1(config-line)#login local
R1(config-line)#transport input ssh
Ad

More Related Content

What's hot (12)

Importance of sshfp and configuring sshfp for network devices
Importance of sshfp and configuring sshfp for network devicesImportance of sshfp and configuring sshfp for network devices
Importance of sshfp and configuring sshfp for network devices
Muhammad Moinur Rahman
 
Importance of SSHFP for Network Devices
Importance of SSHFP for Network DevicesImportance of SSHFP for Network Devices
Importance of SSHFP for Network Devices
APNIC
 
Cpu utilization
Cpu utilizationCpu utilization
Cpu utilization
Rahimullah Hashimi
 
Vpn site to site 2 asa qua gpon ftth thực tế
Vpn site to site 2 asa qua gpon ftth thực tếVpn site to site 2 asa qua gpon ftth thực tế
Vpn site to site 2 asa qua gpon ftth thực tế
laonap166
 
Hacking the swisscom modem
Hacking the swisscom modemHacking the swisscom modem
Hacking the swisscom modem
Cyber Security Alliance
 
Triển khai vpn client to site qua router gpon
Triển khai vpn client to site qua router gponTriển khai vpn client to site qua router gpon
Triển khai vpn client to site qua router gpon
laonap166
 
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupOffline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setup
Cyber Security Alliance
 
VPNIPSec site to site
VPNIPSec site to siteVPNIPSec site to site
VPNIPSec site to site
Dimitri LEMBOKOLO
 
ハイパフォーマンスブラウザネットワーキング2
ハイパフォーマンスブラウザネットワーキング2ハイパフォーマンスブラウザネットワーキング2
ハイパフォーマンスブラウザネットワーキング2
Shuya Osaki
 
Configuracion EIGRP
Configuracion EIGRPConfiguracion EIGRP
Configuracion EIGRP
alexis marck Huiza Canchanya
 
Cisco CCNA Port Security
Cisco CCNA Port SecurityCisco CCNA Port Security
Cisco CCNA Port Security
Hamed Moghaddam
 
DMVPN
DMVPNDMVPN
DMVPN
NetProtocol Xpert
 
Importance of sshfp and configuring sshfp for network devices
Importance of sshfp and configuring sshfp for network devicesImportance of sshfp and configuring sshfp for network devices
Importance of sshfp and configuring sshfp for network devices
Muhammad Moinur Rahman
 
Importance of SSHFP for Network Devices
Importance of SSHFP for Network DevicesImportance of SSHFP for Network Devices
Importance of SSHFP for Network Devices
APNIC
 
Vpn site to site 2 asa qua gpon ftth thực tế
Vpn site to site 2 asa qua gpon ftth thực tếVpn site to site 2 asa qua gpon ftth thực tế
Vpn site to site 2 asa qua gpon ftth thực tế
laonap166
 
Triển khai vpn client to site qua router gpon
Triển khai vpn client to site qua router gponTriển khai vpn client to site qua router gpon
Triển khai vpn client to site qua router gpon
laonap166
 
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupOffline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setup
Cyber Security Alliance
 
ハイパフォーマンスブラウザネットワーキング2
ハイパフォーマンスブラウザネットワーキング2ハイパフォーマンスブラウザネットワーキング2
ハイパフォーマンスブラウザネットワーキング2
Shuya Osaki
 
Cisco CCNA Port Security
Cisco CCNA Port SecurityCisco CCNA Port Security
Cisco CCNA Port Security
Hamed Moghaddam
 

Similar to Configuring ssh on switch (20)

Ciso commands
Ciso commandsCiso commands
Ciso commands
MAFANTIRI SELLO
 
Ciso commands
Ciso commandsCiso commands
Ciso commands
MAFANTIRI SELLO
 
Configure Cisco Routers for Syslog, NTP, and SSH Operations
Configure Cisco Routers for Syslog, NTP, and SSH Operations Configure Cisco Routers for Syslog, NTP, and SSH Operations
Configure Cisco Routers for Syslog, NTP, and SSH Operations
Kelson Silva
 
confijrfnjnfjnfifbejfnjncmdcniofnefnofnc
confijrfnjnfjnfifbejfnjncmdcniofnefnofncconfijrfnjnfjnfifbejfnjncmdcniofnefnofnc
confijrfnjnfjnfifbejfnjncmdcniofnefnofnc
omnia56798
 
OSPF (open shortest path first) part iii
OSPF (open shortest path first) part  iiiOSPF (open shortest path first) part  iii
OSPF (open shortest path first) part iii
Netwax Lab
 
ভিবিন্ন Devise and ar port number
ভিবিন্ন Devise  and ar port numberভিবিন্ন Devise  and ar port number
ভিবিন্ন Devise and ar port number
md shariful eng
 
Mod11
Mod11Mod11
Mod11
Alam Garcia
 
Red Hat Forum Tokyo - OpenStack Architecture
Red Hat Forum Tokyo - OpenStack ArchitectureRed Hat Forum Tokyo - OpenStack Architecture
Red Hat Forum Tokyo - OpenStack Architecture
Dan Radez
 
Sc manual
Sc manualSc manual
Sc manual
MugdhaDeodhar
 
Router commands
Router commandsRouter commands
Router commands
Akshay Bhardwaj
 
Chapter5ccna
Chapter5ccnaChapter5ccna
Chapter5ccna
robertoxe
 
Chapter5ccna
Chapter5ccnaChapter5ccna
Chapter5ccna
ernestlithur
 
Getting started with RDO Havana
Getting started with RDO HavanaGetting started with RDO Havana
Getting started with RDO Havana
Dan Radez
 
Packet Tracer da Cisco (Configuração Básica) Professor Fernando Maviuco - 202...
Packet Tracer da Cisco (Configuração Básica) Professor Fernando Maviuco - 202...Packet Tracer da Cisco (Configuração Básica) Professor Fernando Maviuco - 202...
Packet Tracer da Cisco (Configuração Básica) Professor Fernando Maviuco - 202...
Editora
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
Ajaigururaj R
 
Triangle OpenStack meetup 09 2013
Triangle OpenStack meetup 09 2013Triangle OpenStack meetup 09 2013
Triangle OpenStack meetup 09 2013
Dan Radez
 
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer   configure cisco routers for syslog, ntp, and ssh oper...2.5.1.2 packet tracer   configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
Salem Trabelsi
 
DOD 2016 - Ignat Korchagin - Managing Server Secrets at Scale
DOD 2016 - Ignat Korchagin - Managing Server Secrets at ScaleDOD 2016 - Ignat Korchagin - Managing Server Secrets at Scale
DOD 2016 - Ignat Korchagin - Managing Server Secrets at Scale
PROIDEA
 
Ccnas v11 ch02_eb
Ccnas v11 ch02_ebCcnas v11 ch02_eb
Ccnas v11 ch02_eb
Edgar Benavente
 
managing your network environment
managing your network environmentmanaging your network environment
managing your network environment
scooby_doo
 
Configure Cisco Routers for Syslog, NTP, and SSH Operations
Configure Cisco Routers for Syslog, NTP, and SSH Operations Configure Cisco Routers for Syslog, NTP, and SSH Operations
Configure Cisco Routers for Syslog, NTP, and SSH Operations
Kelson Silva
 
confijrfnjnfjnfifbejfnjncmdcniofnefnofnc
confijrfnjnfjnfifbejfnjncmdcniofnefnofncconfijrfnjnfjnfifbejfnjncmdcniofnefnofnc
confijrfnjnfjnfifbejfnjncmdcniofnefnofnc
omnia56798
 
OSPF (open shortest path first) part iii
OSPF (open shortest path first) part  iiiOSPF (open shortest path first) part  iii
OSPF (open shortest path first) part iii
Netwax Lab
 
ভিবিন্ন Devise and ar port number
ভিবিন্ন Devise  and ar port numberভিবিন্ন Devise  and ar port number
ভিবিন্ন Devise and ar port number
md shariful eng
 
Red Hat Forum Tokyo - OpenStack Architecture
Red Hat Forum Tokyo - OpenStack ArchitectureRed Hat Forum Tokyo - OpenStack Architecture
Red Hat Forum Tokyo - OpenStack Architecture
Dan Radez
 
Chapter5ccna
Chapter5ccnaChapter5ccna
Chapter5ccna
robertoxe
 
Getting started with RDO Havana
Getting started with RDO HavanaGetting started with RDO Havana
Getting started with RDO Havana
Dan Radez
 
Packet Tracer da Cisco (Configuração Básica) Professor Fernando Maviuco - 202...
Packet Tracer da Cisco (Configuração Básica) Professor Fernando Maviuco - 202...Packet Tracer da Cisco (Configuração Básica) Professor Fernando Maviuco - 202...
Packet Tracer da Cisco (Configuração Básica) Professor Fernando Maviuco - 202...
Editora
 
Triangle OpenStack meetup 09 2013
Triangle OpenStack meetup 09 2013Triangle OpenStack meetup 09 2013
Triangle OpenStack meetup 09 2013
Dan Radez
 
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer   configure cisco routers for syslog, ntp, and ssh oper...2.5.1.2 packet tracer   configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
Salem Trabelsi
 
DOD 2016 - Ignat Korchagin - Managing Server Secrets at Scale
DOD 2016 - Ignat Korchagin - Managing Server Secrets at ScaleDOD 2016 - Ignat Korchagin - Managing Server Secrets at Scale
DOD 2016 - Ignat Korchagin - Managing Server Secrets at Scale
PROIDEA
 
managing your network environment
managing your network environmentmanaging your network environment
managing your network environment
scooby_doo
 
Ad

More from tcpipguru (20)

Python programming course
Python programming coursePython programming course
Python programming course
tcpipguru
 
Network testing course
Network testing courseNetwork testing course
Network testing course
tcpipguru
 
Ccna topology based projects
Ccna topology based projectsCcna topology based projects
Ccna topology based projects
tcpipguru
 
Network security projects
Network security projectsNetwork security projects
Network security projects
tcpipguru
 
How to configure Standard ACL for an ip address
How to configure Standard ACL for an ip addressHow to configure Standard ACL for an ip address
How to configure Standard ACL for an ip address
tcpipguru
 
How to configure Standard ACL for a network
How to configure Standard ACL  for a networkHow to configure Standard ACL  for a network
How to configure Standard ACL for a network
tcpipguru
 
Cisco Router Terms
Cisco Router TermsCisco Router Terms
Cisco Router Terms
tcpipguru
 
How to configure Rip version2 on a Cisco router
How to configure Rip version2 on a Cisco routerHow to configure Rip version2 on a Cisco router
How to configure Rip version2 on a Cisco router
tcpipguru
 
How to obtain ip address from a different network dhcp
How to obtain ip address from a different network dhcpHow to obtain ip address from a different network dhcp
How to obtain ip address from a different network dhcp
tcpipguru
 
How to configure Extended acl for an ip address
How to configure Extended acl for an ip addressHow to configure Extended acl for an ip address
How to configure Extended acl for an ip address
tcpipguru
 
How to configure Extended acl for a network
How to configure Extended acl for a networkHow to configure Extended acl for a network
How to configure Extended acl for a network
tcpipguru
 
How to configure EIGRP on a Cisco router
How to configure EIGRP on a Cisco routerHow to configure EIGRP on a Cisco router
How to configure EIGRP on a Cisco router
tcpipguru
 
How to configure DHCP Server
How to configure DHCP Server How to configure DHCP Server
How to configure DHCP Server
tcpipguru
 
How to configure Default Routing
How to configure Default RoutingHow to configure Default Routing
How to configure Default Routing
tcpipguru
 
How to configure SSH on Cisco switch
How to configure SSH on Cisco switchHow to configure SSH on Cisco switch
How to configure SSH on Cisco switch
tcpipguru
 
How to Configure password for telnet and console port of a switch
How to Configure password for telnet and console port of a switchHow to Configure password for telnet and console port of a switch
How to Configure password for telnet and console port of a switch
tcpipguru
 
How to Configure ip address for router interfaces
How to Configure ip address for router interfacesHow to Configure ip address for router interfaces
How to Configure ip address for router interfaces
tcpipguru
 
How to create Security on Cisco switch
How to create Security on Cisco switchHow to create Security on Cisco switch
How to create Security on Cisco switch
tcpipguru
 
How to Save, backup and restore IOS on Cisco router
How to Save, backup and restore IOS on Cisco routerHow to Save, backup and restore IOS on Cisco router
How to Save, backup and restore IOS on Cisco router
tcpipguru
 
How to configure different Spanning tree port status
How to configure different Spanning tree port statusHow to configure different Spanning tree port status
How to configure different Spanning tree port status
tcpipguru
 
Python programming course
Python programming coursePython programming course
Python programming course
tcpipguru
 
Network testing course
Network testing courseNetwork testing course
Network testing course
tcpipguru
 
Ccna topology based projects
Ccna topology based projectsCcna topology based projects
Ccna topology based projects
tcpipguru
 
Network security projects
Network security projectsNetwork security projects
Network security projects
tcpipguru
 
How to configure Standard ACL for an ip address
How to configure Standard ACL for an ip addressHow to configure Standard ACL for an ip address
How to configure Standard ACL for an ip address
tcpipguru
 
How to configure Standard ACL for a network
How to configure Standard ACL  for a networkHow to configure Standard ACL  for a network
How to configure Standard ACL for a network
tcpipguru
 
Cisco Router Terms
Cisco Router TermsCisco Router Terms
Cisco Router Terms
tcpipguru
 
How to configure Rip version2 on a Cisco router
How to configure Rip version2 on a Cisco routerHow to configure Rip version2 on a Cisco router
How to configure Rip version2 on a Cisco router
tcpipguru
 
How to obtain ip address from a different network dhcp
How to obtain ip address from a different network dhcpHow to obtain ip address from a different network dhcp
How to obtain ip address from a different network dhcp
tcpipguru
 
How to configure Extended acl for an ip address
How to configure Extended acl for an ip addressHow to configure Extended acl for an ip address
How to configure Extended acl for an ip address
tcpipguru
 
How to configure Extended acl for a network
How to configure Extended acl for a networkHow to configure Extended acl for a network
How to configure Extended acl for a network
tcpipguru
 
How to configure EIGRP on a Cisco router
How to configure EIGRP on a Cisco routerHow to configure EIGRP on a Cisco router
How to configure EIGRP on a Cisco router
tcpipguru
 
How to configure DHCP Server
How to configure DHCP Server How to configure DHCP Server
How to configure DHCP Server
tcpipguru
 
How to configure Default Routing
How to configure Default RoutingHow to configure Default Routing
How to configure Default Routing
tcpipguru
 
How to configure SSH on Cisco switch
How to configure SSH on Cisco switchHow to configure SSH on Cisco switch
How to configure SSH on Cisco switch
tcpipguru
 
How to Configure password for telnet and console port of a switch
How to Configure password for telnet and console port of a switchHow to Configure password for telnet and console port of a switch
How to Configure password for telnet and console port of a switch
tcpipguru
 
How to Configure ip address for router interfaces
How to Configure ip address for router interfacesHow to Configure ip address for router interfaces
How to Configure ip address for router interfaces
tcpipguru
 
How to create Security on Cisco switch
How to create Security on Cisco switchHow to create Security on Cisco switch
How to create Security on Cisco switch
tcpipguru
 
How to Save, backup and restore IOS on Cisco router
How to Save, backup and restore IOS on Cisco routerHow to Save, backup and restore IOS on Cisco router
How to Save, backup and restore IOS on Cisco router
tcpipguru
 
How to configure different Spanning tree port status
How to configure different Spanning tree port statusHow to configure different Spanning tree port status
How to configure different Spanning tree port status
tcpipguru
 
Ad

Recently uploaded (20)

Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Alan Dix
 
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Wonjun Hwang
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
Understanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdfUnderstanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdf
Fulcrum Concepts, LLC
 
Cybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and MitigationCybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and Mitigation
VICTOR MAESTRE RAMIREZ
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier VroomAI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
UXPA Boston
 
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptxReimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
John Moore
 
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdfICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
Eryk Budi Pratama
 
Build With AI - In Person Session Slides.pdf
Build With AI - In Person Session Slides.pdfBuild With AI - In Person Session Slides.pdf
Build With AI - In Person Session Slides.pdf
Google Developer Group - Harare
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Vasileios Komianos
 
How to Build an AI-Powered App: Tools, Techniques, and Trends
How to Build an AI-Powered App: Tools, Techniques, and TrendsHow to Build an AI-Powered App: Tools, Techniques, and Trends
How to Build an AI-Powered App: Tools, Techniques, and Trends
Nascenture
 
React Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for SuccessReact Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for Success
Amelia Swank
 
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
João Esperancinha
 
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdfKit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Wonjun Hwang
 
Cybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft CertificateCybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft Certificate
VICTOR MAESTRE RAMIREZ
 
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptxDevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
Justin Reock
 
Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Everything You Need to Know About Agentforce? (Put AI Agents to Work)Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Cyntexa
 
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Alan Dix
 
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Wonjun Hwang
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
Understanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdfUnderstanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdf
Fulcrum Concepts, LLC
 
Cybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and MitigationCybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and Mitigation
VICTOR MAESTRE RAMIREZ
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier VroomAI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
UXPA Boston
 
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptxReimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
John Moore
 
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdfICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
Eryk Budi Pratama
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Vasileios Komianos
 
How to Build an AI-Powered App: Tools, Techniques, and Trends
How to Build an AI-Powered App: Tools, Techniques, and TrendsHow to Build an AI-Powered App: Tools, Techniques, and Trends
How to Build an AI-Powered App: Tools, Techniques, and Trends
Nascenture
 
React Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for SuccessReact Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for Success
Amelia Swank
 
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
João Esperancinha
 
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdfKit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Wonjun Hwang
 
Cybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft CertificateCybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft Certificate
VICTOR MAESTRE RAMIREZ
 
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptxDevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
Justin Reock
 
Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Everything You Need to Know About Agentforce? (Put AI Agents to Work)Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Cyntexa
 

Configuring ssh on switch

  • 1. SSH Configuration on switch WWW.TCPIPGURU.CO M
  • 3. Configuring SSH on switch: R1>enable R1#config t Router(config)#hos Router(config)#hostname R1 R1(config)#ip do R1(config)#ip domain-n R1(config)#ip domain-n R1(config)#crypto key R1(config)#crypto key gen R1(config)#crypto key generate rs R1(config)#crypto key generate rsa gen R1(config)#crypto key generate rsa general-keys mo R1(config)#crypto key generate rsa general-keys modulus 768 % The key modulus size is 768 bits % Generating 768 bit RSA keys, keys will be non-exportable...[OK] *Mar 1 08:45:37.633: %SSH-5-ENABLED: SSH 1.99 has been enabled
  • 4. R1(config)#ip ssh time-out 60 R1(config)#ip ssh authentication-retries 3 R1(config)#username admin password 123 R1(config)#line vty 0 6 R1(config-line)#login local R1(config-line)#transport input ssh
  翻译: