How to Configure SSH on a Cisco Router or Switch: A Step-by-Step Guide


Configuring Secure Shell (SSH) on a Cisco router is essential for secure remote management. This guide provides a comprehensive step-by-step process to configure SSH on a Cisco router using the command line. By following these instructions, you can ensure that your router is securely accessible via SSH.


Step 1: Changing the Hostname

The first step in configuring SSH is to change the default hostname of the router. This makes the router easily identifiable within the network.


        Router(config)# hostname R1


Here, we change the router's hostname to "R1".


Step 2: Configuring a Local User and Password

Next, we need to create a local user account with a password. This user account will be used for authentication when connecting via SSH.


        R1(config)# username Bob password Let-me-in!


In this example, a user named "Bob" with the password "Let-me-in!" is created.


Step 3: Setting the Domain Name

Setting the domain name is necessary for the generation of encryption keys. This step is crucial for enabling SSH.


        R1(config)# ip domain-name SAYEDTECH.COM


Here, we set the domain name to "SAYEDTECH.COM". You can replace "ANYTHING.COM" with your actual domain name.


Step 4: Generating the RSA Encryption Key

To encrypt the SSH communication, we need to generate an RSA key pair. This key pair will be used to secure the data transmitted over the SSH session.


        R1(config)# crypto key generate rsa


When prompted, select a key size of 1024 bits. This size provides a good balance between security and performance.


Step 5: Configuring SSH Version 2

SSH version 2 is more secure and recommended for use over SSH version 1. Configuring the router to use SSH version 2 ensures that your SSH sessions are as secure as possible.


        R1(config)# ip ssh version 2


Step 6: Configuring VTY Lines for Remote Access

VTY lines are virtual terminal lines that allow remote access to the router. We need to configure these lines to use SSH for remote management.


        R1(config)# line vty 0 15


This command selects all 16 VTY lines (0 through 15) for configuration.


Step 7: Enabling Local Login Authentication

We configure the router to authenticate incoming SSH sessions against the local user database that we set up earlier.


        R1(config-line)# login local


Step 8: Restricting Access to SSH Only

Finally, we configure the VTY lines to only accept SSH connections. This step ensures that telnet or other insecure protocols are not used for remote access.


    R1(config-line)# transport input ssh


By following these steps, you have successfully configured SSH on your Cisco router. This setup ensures that remote management of your router is secure and that unauthorized access is minimized. Here’s a summary of the commands used:


        Router(config)# hostname R1

        R1(config)# username Bob password Let-me-in!

        R1(config)# ip domain-name SAYEDTECH.COM

        R1(config)# crypto key generate rsa

        R1(config)# ip ssh version 2

        R1(config)# line vty 0 15

        R1(config-line)# login local

        R1(config-line)# transport input ssh


Ensuring that your network devices are securely accessible is a fundamental aspect of network management. SSH provides a secure method for remote administration, and configuring it properly is essential for maintaining the security and integrity of your network infrastructure.


If found helpful please share likes and comments for more 

Thank you for your valuable time 



Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.