![Switch Security: Management and Implementation (2.2) > Cisco Networking Academy's Introduction to Basic Switching Concepts and Configuration | Cisco Press Switch Security: Management and Implementation (2.2) > Cisco Networking Academy's Introduction to Basic Switching Concepts and Configuration | Cisco Press](https://www.ciscopress.com/content/images/chap2_9781587133183/elementLinks/02fig12_alt.jpg)
Switch Security: Management and Implementation (2.2) > Cisco Networking Academy's Introduction to Basic Switching Concepts and Configuration | Cisco Press
![ssh configuration on switch – Learn Linux CCNA CCNP CEH CISSP CISA Penetration-Testing Bug Bounty IPv6 Cyber-Security Network-Security Online ssh configuration on switch – Learn Linux CCNA CCNP CEH CISSP CISA Penetration-Testing Bug Bounty IPv6 Cyber-Security Network-Security Online](https://linuxtiwary.files.wordpress.com/2015/03/telnet-configuration-on-switch1.png)
ssh configuration on switch – Learn Linux CCNA CCNP CEH CISSP CISA Penetration-Testing Bug Bounty IPv6 Cyber-Security Network-Security Online
![Configure Secure Shell (SSH) User Authentication Settings on a Cisco Business 350 Series Switch - Cisco Configure Secure Shell (SSH) User Authentication Settings on a Cisco Business 350 Series Switch - Cisco](https://www.cisco.com/c/dam/en/us/support/docs/smb/switches/Cisco-Business-Switching/images/kmgmt-2775-configure-secure-shell-ssh-user-authentication-settings-cbs-image2.png)