Cisco Systems CL-28826-01 Security Camera User Manual


  Open as PDF
of 2616
 
60-65
User Guide for Cisco Security Manager 4.4
OL-28826-01
Chapter 60 Router Device Administration
Secure Shell Policy Page
Note You must configure SSH on the device using CLI commands before adding the device to Security
Manager. This is because Security Manager uses SSH (as well as SSL) to communicate with Cisco IOS
routers. For more information, see Setting Up SSH, page 2-5.
Navigation Path
(Device view) Select Platform > Device Admin > Device Access > Secure Shell from the Policy
selector.
(Policy view) Select Router Platform > Device Admin > Device Access > Secure Shell from the
Policy Type selector. Right-click Secure Shell to create a policy, or select an existing policy from
the Shared Policy selector.
Related Topics
Chapter 2, “Preparing Devices for Management”
VTY Policy Page, page 60-50
Console Policy Page, page 60-42
Field Reference
Table 60-28 Secure Shell Page
Element Description
SSH Version The version of SSH to use when connecting to the router:
1 and 2—SSH version 1 and SSH version 2. This is the default.
1—SSH version 1 only.
2—SSH version 2 only.
Timeout The amount of time the router should wait for the SSH client to respond
during the negotiation phase before disconnecting. The default value
(and the maximum) is 120 seconds.
Note After negotiation finishes and the EXEC session begins, the
timeout configured for the VTY line applies. See VTY Line
Dialog Box—Setup Tab, page 60-52.
Authentication Retries The number of times the router attempts to authenticate SSH clients.
Valid values range from 0 to 5. The default is 3.
Source Interface The source address for all SSH packets sent to the SSH client.
If you do not define a value in this field, the address of the closest
interface to the destination (that is, the output interface through which
SSH packets are sent) is used.
Enter the name of an interface or interface role, or click Select to select
the object from a list or to create a new one.