Cisco Switch Telnet & SSH Configuration Guide
I. Telnet Configuration Steps
Enter global configuration mode
First enter privileged EXEC mode
Then access global configuration mode
Configure VTY lines (Telnet access channels)
Configure virtual terminal sessions (typically 16 sessions: 0-15)
Enable Telnet protocol (enabled by default, optional configuration)
Set local username/password authentication (optional)
Configure plaintext password (e.g., "cisco")
Configure privileged mode password (required)
Set encrypted enable secret password (e.g., "admin@123")
Configure local username/password (alternative to VTY password)
Create username with encrypted secret password (e.g., username "admin" with password "admin@123")
Save configuration
Write running configuration to startup configuration
II. SSH Configuration Steps
Set hostname and domain name (required)
Configure custom device hostname (e.g., "Switch")
Specify domain name (any valid domain value required)
Generate RSA key pair (enables SSH service)
Create encryption keys with recommended 2048-bit modulus length
Configure SSH parameters
Enable SSH version 2 (more secure)
Set connection timeout (60 seconds)
Configure maximum authentication attempts (3 retries)
Configure VTY lines (restrict to SSH only)
Disable Telnet access
Permit only SSH connections
Enforce local username authentication
Create privileged local user (for SSH login)
Configure username with maximum privilege level (15) and encrypted password (e.g., username "admin" with password "ssh@123")
Save configuration
Write configuration to non-volatile memory
III. Verification Commands
Check SSH status
Display SSH version, service status and cryptographic key information
Test remote access
From client machine (replace with switch IP address):
Verify Telnet connectivity
Test SSH login (e.g., "ssh -l admin 192.168.1.1")
Key Notes:
Telnet transmits data in clear text (insecure)
SSH provides encrypted communication (recommended)
Always verify service status after configuration
Privilege level 15 provides maximum administrative access