What happens when the transport input ssh
command is entered on the switch vty lines?
- The switch requires a username/password combination for remote access.
- The SSH client on the switch is enabled.
- Communication between the switch and remote users is encrypted.
- The switch requires remote connections via a proprietary client software.
For more Questions and Answers:
CCNA 1 – ITN v7.02 – ITNv7 Final Exam Answers Full 100%
When the command transport input ssh
is entered on the virtual terminal (VTY) lines of a Cisco switch, it specifies the allowed protocol for remote access to the switch. Among the provided options, the correct answer is:
✅ Communication between the switch and remote users is encrypted.
This command enables SSH-only access to the switch’s VTY lines and disables other protocols such as Telnet. Here’s a detailed breakdown of what this command does, why it’s used, and its implications for switch management and network security.
🛡️ What is SSH and Why Is It Important?
SSH (Secure Shell) is a cryptographic network protocol used for secure remote login and command execution. Unlike Telnet, which sends data (including usernames and passwords) in plaintext, SSH encrypts all communication between the client and the device. This ensures that sensitive information remains protected from interception by unauthorized users or malicious actors.
🔧 Understanding the Command
When you configure the command on a Cisco switch like this:
You are telling the switch:
-
Only accept SSH connections for VTY (remote) access.
-
Reject any attempt to access the switch via Telnet or other non-specified protocols.
This command is commonly used in production environments where security is a top priority.
✅ Correct Answer Explained
“Communication between the switch and remote users is encrypted.”
This is the most accurate statement because:
-
The
transport input ssh
command restricts remote management access to use SSH only. -
SSH uses encryption mechanisms (e.g., RSA or other key exchange algorithms) to secure both authentication and command execution sessions.
-
This means usernames, passwords, commands, and responses are all encrypted as they travel over the network.
❌ Why the Other Options Are Incorrect
1. “The switch requires a username/password combination for remote access.”
This statement may sometimes be true, but it’s not guaranteed by the transport input ssh
command alone.
-
SSH typically uses username and password authentication, but it can also use public/private key authentication.
-
Also, whether the switch requires login credentials depends on additional configuration, such as:
Thus, the transport input ssh
command doesn’t enforce the use of a username and password by itself.
2. “The SSH client on the switch is enabled.”
This is misleading.
-
The command affects the VTY lines, meaning it allows SSH connections to the switch, not from it.
-
Cisco switches don’t use SSH clients to initiate outbound connections unless specifically configured (and some models don’t support SSH client functions at all).
-
To enable SSH server functionality, other steps are required, such as:
These commands generate the necessary encryption keys and enable SSH services on the switch.
3. “The switch requires remote connections via a proprietary client software.”
This is entirely incorrect.
-
SSH is a widely accepted open standard, not proprietary.
-
Users can connect using any standard SSH client, such as:
-
PuTTY (Windows)
-
OpenSSH (Linux/macOS)
-
SecureCRT
-
Or even browser-based SSH terminals
-
There’s no proprietary requirement for software when using SSH to access Cisco switches.
🔐 Practical Security Implications
In a real-world environment, using transport input ssh
provides the following benefits:
-
Encrypted Management Sessions – Prevents sniffing attacks where an attacker could intercept Telnet traffic.
-
Secure Authentication – Optionally supports public key authentication, eliminating password reuse risks.
-
Compliance and Auditing – Meets many IT policy and security compliance standards (e.g., PCI-DSS, HIPAA, ISO 27001).
-
Disables Weak Protocols – Helps enforce strong access policies by disabling older, unencrypted protocols like Telnet.
🧰 Additional Related Configuration
To fully configure SSH on a Cisco switch, the following minimum steps are generally needed:
This ensures:
-
SSH server is running
-
RSA keys are generated
-
Login credentials are configured
-
SSH protocol version 2 (more secure) is used
🧠 Summary Cheat Sheet
Command | Purpose |
---|---|
transport input ssh |
Allows only SSH access on VTY lines |
login local |
Uses local username/password for authentication |
username <name> password <p> |
Creates a local login account |
crypto key generate rsa |
Generates RSA keys required for SSH encryption |
ip ssh version 2 |
Enables more secure SSH protocol version 2 |
ip domain-name + hostname |
Required to generate RSA keys |
🧩 Final Thoughts
In conclusion, entering transport input ssh
on a switch’s VTY lines is a fundamental step toward securing remote access to the device. It ensures that only encrypted communications are allowed, preventing attackers from reading sensitive management traffic. While it doesn’t enable SSH by itself or set up user accounts, it is part of a best-practice security configuration that all network administrators should be familiar with.