Security-minded network administrators like to manage network equipment using encrypted protocols such as SSH. Cisco IOS routers and switches often require extra configuration to enable SSH. As always, refer to official Cisco IOS SSH documentation for a much more authoritative and complete guide. Here are some hints to help get it working.
! -- enable privileged exec mode -- > enable ! -- check for rsa keys required by ssh -- # show crypto key mypubkey rsa ! -- configure from the terminal -- # configure terminal ! -- if no key is listed, create one -- (config)# key generate rsa modulus 2048 ! -- allow ssh for incoming connections -- ! -- timeout ssh sessions in 30 minutes -- (config)# line vty 0 4 (config-line)# transport input ssh (config-line)# exec-timeout 30 (config-line)# exit ! -- require version 2 and enable scp -- (config)# ip ssh version 2 (config)# ip scp server enable (config)# exit ! -- save your changes!! -- # write memory
You may need to configure some aaa settings if you want to set a username, use more than one local account, etc. See the official Cisco docs for SSH aaa information. Linux systems come with great built-in ssh client support, but Windows users will need to install an ssh client program such as the incredibly popular PuTTY SSH Client.