SSH Version 2 Configuration
The SSH protocol (Secure Shell) is a method for secure remote login from one device to other. SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an SSH server. As discussed in another blog, SSH has two versions –
SSH VERSION 1
SSH v1 (Secure Shell) provides an encrypted channel to users for logging into remote device. It provides strong host-to-host and user authentication. It also provides secure encrypted communications over the Internet.
On the contrary, SSH2 is a much more secured, an efficient version of SSH that includes SFTP, which is functionally similar to FTP with addition of SSH2 encryption.
Steps to configure SSH:
- Configure the router hostname using command “hostname”.
- Configure the domain name using command “ip domain-name”.
- Generate public and private keys using command “crypto key generate rsa”.
- Create a user in the local database using command “username…secret”.
- Allow only SSH access on VTY lines using command “transport input ssh”.
SSH Version 2 configuration on a Cisco router IOS –
Configure Hostname and DNS Domain
Generate RSA key to be used.
Enables the SSH server for local and remote authentication on the router
For SSH Version 2, the modulus size must be at least 768 bits.
Configures SSH control variables on the Router.
Configure SSH version 2 (This will disable SSH version 1)
Step 3 –
Enable SSH transport support for the virtual type terminal (vty)