Implementing Secure Shell on Cisco IOS XR Software
How to Implement Secure Shell
SC-205
Cisco IOS XR System Security Configuration Guide for the Cisco CRS-1 Router
OL-20382-01
DETAILED STEPS
Command or Action Purpose
Step 1
configure
Example:
RP/0/RP0/CPU0:router# configure
Enters global configuration mode.
Step 2
hostname hostname
Example:
RP/0/RP0/CPU0:router(config)# hostname router1
Configures a hostname for your router.
Step 3
domain name domain-name
Example:
RP/0/RP0/CPU0:router(config)# domain name
cisco.com
Defines a default domain name that the software uses to
complete unqualified host names.
Step 4
exit
Example:
RP/0/RP0/CPU0:router(config)# exit
Exits global configuration mode, and returns the router to
EXEC mode.
Step 5
crypto key generate rsa [usage keys |
general-keys] [keypair-label]
Example:
RP/0/RP0/CPU0:router# crypto key generate rsa
general-keys
Generates an RSA key pair.
• To delete the RSA key pair, use the crypto key zeroize
rsa command.
This command is used for SSHv1 only.
Step 6
crypto key generate dsa
Example:
RP/0/RP0/CPU0:router# crypto key generate dsa
Enables the SSH server for local and remote authentication
on the router.
• The recommended minimum modulus size is 1024 bits.
• Generates a DSA key pair.
To delete the DSA key pair, use the crypto key zeroize
dsa command.
This command is used only for SSHv2.
Step 7
configure
Example:
RP/0/RP0/CPU0:router# configure
Enters global configuration mode.
Step 8
ssh timeout seconds
Example:
RP/0/RP0/CPU0:router(config)# ssh timeout 60
(Optional) Configures the timeout value for user
authentication to AAA.
• If the user fails to authenticate itself to AAA within the
configured time, the connection is aborted.
• If no value is configured, the default value of
30 seconds is used. The range is from 5 to 120.