{"id":12,"date":"2026-05-01T17:13:32","date_gmt":"2026-05-01T15:13:32","guid":{"rendered":"http:\/\/192.168.20.20\/?p=12"},"modified":"2026-05-02T14:06:58","modified_gmt":"2026-05-02T12:06:58","slug":"fiche-initialisation-switch-cisco-ssh-et-securisation-de-base","status":"publish","type":"post","link":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\/","title":{"rendered":"Fiche Initialisation Switch Cisco &#8211; ssh et s\u00e9curisation de base"},"content":{"rendered":"\n<p>Dans un contexte o\u00f9 les \u00e9quipements r\u00e9seau sont des points critiques du syst\u00e8me d\u2019information, il est essentiel de s\u00e9curiser leur acc\u00e8s d\u00e8s leur mise en service. Par d\u00e9faut, un switch peut \u00eatre expos\u00e9 \u00e0 des connexions non s\u00e9curis\u00e9es ou \u00e0 des tentatives d\u2019acc\u00e8s non contr\u00f4l\u00e9es.<\/p>\n\n\n\n<p>Cette fiche pr\u00e9sente une configuration de base permettant de mettre en place un acc\u00e8s distant s\u00e9curis\u00e9 via <strong>SSH<\/strong>, en d\u00e9sactivant <strong>Telnet<\/strong>, en chiffrant les mots de passe et en limitant les connexions aux seuls postes autoris\u00e9s. L\u2019objectif est de r\u00e9duire la surface d\u2019attaque tout en conservant une administration simple et efficace.<\/p>\n\n\n\n<p>La configuration propos\u00e9e est adapt\u00e9e \u00e0 un environnement de type <strong>BTS CIEL \/ SIO<\/strong>, mais reprend \u00e9galement des bonnes pratiques utilis\u00e9es en conditions r\u00e9elles d\u2019exploitation.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"http:\/\/192.168.20.20\/wp-content\/uploads\/2026\/05\/image-1-1024x683.png\" alt=\"\" class=\"wp-image-16\" srcset=\"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/image-1-1024x683.png 1024w, https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/image-1-300x200.png 300w, https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/image-1-768x512.png 768w, https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/image-1.png 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code>enable\nconfigure terminal\n\n! Nom du switch\nhostname S1\n\n! D\u00e9sactive la r\u00e9solution DNS (\u00e9vite les blocages)\nno ip domain-lookup\n\n! Mot de passe privil\u00e9gi\u00e9\nenable secret MonMotDePasseFort\n\n! Chiffrement des mots de passe\nservice password-encryption\n\n! Cr\u00e9ation d\u2019un utilisateur local\nusername admin privilege 15 secret MotDePasseAdminFort\n\n! Domaine (obligatoire pour SSH)\nip domain-name lab.local\n\n! G\u00e9n\u00e9ration des cl\u00e9s RSA (2048 bits recommand\u00e9)\ncrypto key generate rsa\n2048\n\n! S\u00e9curisation SSH\nip ssh version 2\nip ssh time-out 60\nip ssh authentication-retries 3\n\n! Configuration des acc\u00e8s VTY : SSH uniquement (pas de Telnet)\nline vty 0 15\ntransport input ssh\nlogin local\nexec-timeout 5 0\nexit\n\n! (Option avec ACL) Restriction par IP\naccess-list 10 permit 192.168.1.0 0.0.0.255\nline vty 0 15\naccess-class 10 in\nexit\n\n! Interface de management (VLAN 1 par d\u00e9faut)\ninterface vlan 1\nip address 192.168.1.10 255.255.255.0\nno shutdown\nexit\n\n! Passerelle par d\u00e9faut\nip default-gateway 192.168.1.1\nend\n\n! Sauvegarde de la configuration\nwrite memory\n\n! ou : copy running-config startup-config\n! ou : copy run start<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Explication d\u00e9taill\u00e9e de la configuration<\/h2>\n\n\n\n<p>Cette configuration permet d\u2019initialiser un switch Cisco en mettant en place un acc\u00e8s d\u2019administration s\u00e9curis\u00e9 \u00e0 distance avec <strong>SSH<\/strong>. Elle d\u00e9sactive l\u2019acc\u00e8s non s\u00e9curis\u00e9 par <strong>Telnet<\/strong>, chiffre les mots de passe visibles dans la configuration et limite l\u2019acc\u00e8s SSH aux machines autoris\u00e9es.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>enable<br>configure terminal<\/code><\/pre>\n\n\n\n<p>Ces commandes permettent de passer en mode privil\u00e9gi\u00e9, puis en mode configuration globale. C\u2019est dans ce mode que l\u2019on peut modifier la configuration du switch.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>hostname S1<\/code><\/pre>\n\n\n\n<p>Cette commande donne un nom au switch. Ici, le switch s\u2019appelle <code>S1<\/code>. Cela permet de mieux identifier l\u2019\u00e9quipement dans le terminal, surtout lorsqu\u2019on administre plusieurs \u00e9quipements r\u00e9seau.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>no ip domain-lookup<\/code><\/pre>\n\n\n\n<p>Cette commande d\u00e9sactive la r\u00e9solution DNS automatique. Sans cette commande, si une commande est mal tap\u00e9e, le switch peut essayer de la r\u00e9soudre comme un nom de domaine, ce qui provoque une attente inutile.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>enable secret MonMotDePasseFort<\/code><\/pre>\n\n\n\n<p>Cette commande d\u00e9finit le mot de passe du mode privil\u00e9gi\u00e9. Le mot de passe configur\u00e9 avec <code>enable secret<\/code> est chiffr\u00e9 de mani\u00e8re plus s\u00e9curis\u00e9e que l\u2019ancien <code>enable password<\/code>.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>service password-encryption<\/code><\/pre>\n\n\n\n<p>Cette commande chiffre les mots de passe visibles dans la configuration. Cela \u00e9vite que certains mots de passe apparaissent en clair dans le fichier de configuration.<\/p>\n\n\n\n<p>Attention : ce chiffrement prot\u00e8ge surtout contre une lecture rapide de la configuration. Ce n\u2019est pas un chiffrement tr\u00e8s fort, mais c\u2019est une bonne pratique de base.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>username admin privilege 15 secret MotDePasseAdminFort<\/code><\/pre>\n\n\n\n<p>Cette commande cr\u00e9e un utilisateur local nomm\u00e9 <code>admin<\/code>.<\/p>\n\n\n\n<p>Le niveau <code>privilege 15<\/code> donne \u00e0 cet utilisateur les droits administrateur complets sur le switch. Le mot de passe est d\u00e9fini avec <code>secret<\/code>, ce qui est pr\u00e9f\u00e9rable \u00e0 <code>password<\/code>.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ip domain-name lab.local<\/code><\/pre>\n\n\n\n<p>Cette commande d\u00e9finit un nom de domaine local. Elle est n\u00e9cessaire pour g\u00e9n\u00e9rer les cl\u00e9s RSA utilis\u00e9es par SSH.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>crypto key generate rsa<br>2048<\/code><\/pre>\n\n\n\n<p>Cette commande g\u00e9n\u00e8re les cl\u00e9s RSA du switch. Ces cl\u00e9s sont utilis\u00e9es pour \u00e9tablir une connexion SSH chiffr\u00e9e.<\/p>\n\n\n\n<p>Une taille de <strong>2048 bits<\/strong> est recommand\u00e9e pour une meilleure s\u00e9curit\u00e9.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ip ssh version 2<\/code><\/pre>\n\n\n\n<p>Cette commande force l\u2019utilisation de SSH version 2. SSH v2 est plus s\u00e9curis\u00e9 que SSH v1.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ip ssh time-out 60<\/code><\/pre>\n\n\n\n<p>Cette commande limite le temps d\u2019attente lors d\u2019une tentative de connexion SSH. Ici, le switch attend au maximum 60 secondes.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ip ssh authentication-retries 2<\/code><\/pre>\n\n\n\n<p>Cette commande limite le nombre de tentatives d\u2019authentification SSH. Ici, seules 2 tentatives sont autoris\u00e9es avant coupure de la session.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>line vty 0 15<\/code><\/pre>\n\n\n\n<p>Les lignes VTY sont les lignes utilis\u00e9es pour les connexions distantes, comme SSH ou Telnet.<\/p>\n\n\n\n<p>Sur beaucoup de switchs Cisco, il existe plusieurs lignes VTY, par exemple de <code>0<\/code> \u00e0 <code>15<\/code>.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>transport input ssh<\/code><\/pre>\n\n\n\n<p>Cette commande autorise uniquement SSH sur les lignes VTY.<\/p>\n\n\n\n<p>Elle d\u00e9sactive donc l\u2019acc\u00e8s Telnet, car Telnet n\u2019est pas indiqu\u00e9 dans les protocoles autoris\u00e9s.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>login local<\/code><\/pre>\n\n\n\n<p>Cette commande indique au switch d\u2019utiliser la base d\u2019utilisateurs locale pour l\u2019authentification.<\/p>\n\n\n\n<p>Dans notre cas, le switch utilisera donc l\u2019utilisateur :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>username admin privilege 15 secret MotDePasseAdminFort<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>exec-timeout 5 0<\/code><\/pre>\n\n\n\n<p>Cette commande ferme automatiquement la session apr\u00e8s 5 minutes d\u2019inactivit\u00e9.<\/p>\n\n\n\n<p>Cela \u00e9vite qu\u2019une session SSH reste ouverte ind\u00e9finiment sur un poste oubli\u00e9.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>access-list 10 permit 192.168.1.0 0.0.0.255<\/code><\/pre>\n\n\n\n<p>Cette commande cr\u00e9e une ACL standard num\u00e9ro <code>10<\/code>.<\/p>\n\n\n\n<p>Elle autorise uniquement les adresses IP du r\u00e9seau :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>192.168.1.0\/24<\/code><\/pre>\n\n\n\n<p>Le masque wildcard <code>0.0.0.255<\/code> correspond au masque classique :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>255.255.255.0<\/code><\/pre>\n\n\n\n<p>Donc les machines autoris\u00e9es sont celles comprises entre :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>192.168.1.1 et 192.168.1.254<\/code><\/pre>\n\n\n\n<p>Toutes les autres adresses sont refus\u00e9es implicitement.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>line vty 0 15<br>access-class 10 in<\/code><\/pre>\n\n\n\n<p>Cette commande applique l\u2019ACL 10 sur les lignes VTY en entr\u00e9e.<\/p>\n\n\n\n<p>Cela signifie que seules les machines du r\u00e9seau <code>192.168.1.0\/24<\/code> peuvent tenter une connexion SSH vers le switch.<\/p>\n\n\n\n<p>C\u2019est une mesure importante : m\u00eame si SSH est s\u00e9curis\u00e9, on limite les machines autoris\u00e9es \u00e0 acc\u00e9der \u00e0 l\u2019administration.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>interface vlan 1<br>ip address 192.168.1.10 255.255.255.0<br>no shutdown<\/code><\/pre>\n\n\n\n<p>Cette partie configure l\u2019adresse IP de management du switch.<\/p>\n\n\n\n<p>Le switch re\u00e7oit ici l\u2019adresse :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>192.168.1.10\/24<\/code><\/pre>\n\n\n\n<p>Cette adresse permet d\u2019administrer le switch \u00e0 distance, par exemple en SSH.<\/p>\n\n\n\n<p>La commande <code>no shutdown<\/code> active l\u2019interface VLAN.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ip default-gateway 192.168.1.1<\/code><\/pre>\n\n\n\n<p>Cette commande indique la passerelle par d\u00e9faut du switch.<\/p>\n\n\n\n<p>Elle est utile si le switch doit \u00eatre administr\u00e9 depuis un autre r\u00e9seau.<\/p>\n\n\n\n<p>Par exemple, si le poste d\u2019administration n\u2019est pas dans le m\u00eame r\u00e9seau que le switch, le switch doit savoir vers quelle passerelle envoyer ses r\u00e9ponses.<\/p>\n\n\n\n<p>Sur un switch de couche 2, on utilise :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ip default-gateway 192.168.1.1<\/code><\/pre>\n\n\n\n<p>Sur un switch de couche 3 avec le routage activ\u00e9, on utiliserait plut\u00f4t une route par d\u00e9faut.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>end<\/code><\/pre>\n\n\n\n<p>Cette commande permet de quitter le mode configuration et de revenir au mode privil\u00e9gi\u00e9.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>write memory<\/code><\/pre>\n\n\n\n<p>Cette commande sauvegarde la configuration active dans la m\u00e9moire de d\u00e9marrage.<\/p>\n\n\n\n<p>Elle est \u00e9quivalente \u00e0 :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>copy running-config startup-config<\/code><\/pre>\n\n\n\n<p>Sans cette sauvegarde, la configuration serait perdue au red\u00e9marrage du switch.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans un contexte o\u00f9 les \u00e9quipements r\u00e9seau sont des points critiques du syst\u00e8me d\u2019information, il est essentiel de s\u00e9curiser leur acc\u00e8s d\u00e8s leur mise en service. Par d\u00e9faut, un switch peut \u00eatre expos\u00e9 \u00e0 des connexions non s\u00e9curis\u00e9es ou \u00e0 des tentatives d\u2019acc\u00e8s non contr\u00f4l\u00e9es. Cette fiche pr\u00e9sente une configuration de base permettant de mettre [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4,10],"tags":[3],"class_list":["post-12","post","type-post","status-publish","format-standard","hentry","category-cisco","category-reseau","tag-cisco"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fiche Initialisation Switch Cisco - ssh et s\u00e9curisation de base - Eryann Breizh SecOps<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fiche Initialisation Switch Cisco - ssh et s\u00e9curisation de base - Eryann Breizh SecOps\" \/>\n<meta property=\"og:description\" content=\"Dans un contexte o\u00f9 les \u00e9quipements r\u00e9seau sont des points critiques du syst\u00e8me d\u2019information, il est essentiel de s\u00e9curiser leur acc\u00e8s d\u00e8s leur mise en service. Par d\u00e9faut, un switch peut \u00eatre expos\u00e9 \u00e0 des connexions non s\u00e9curis\u00e9es ou \u00e0 des tentatives d\u2019acc\u00e8s non contr\u00f4l\u00e9es. Cette fiche pr\u00e9sente une configuration de base permettant de mettre [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\/\" \/>\n<meta property=\"og:site_name\" content=\"Eryann Breizh SecOps\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-01T15:13:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-02T12:06:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/image-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"wpadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wpadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\\\/\"},\"author\":{\"name\":\"wpadmin\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/person\\\/d2ee98d2385cd045ed4fe1c07ca320b5\"},\"headline\":\"Fiche Initialisation Switch Cisco &#8211; ssh et s\u00e9curisation de base\",\"datePublished\":\"2026-05-01T15:13:32+00:00\",\"dateModified\":\"2026-05-02T12:06:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\\\/\"},\"wordCount\":905,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/192.168.20.20\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/image-1-1024x683.png\",\"keywords\":[\"cisco\"],\"articleSection\":[\"Cisco\",\"R\u00e9seau\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\\\/\",\"url\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\\\/\",\"name\":\"Fiche Initialisation Switch Cisco - ssh et s\u00e9curisation de base - Eryann Breizh SecOps\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/192.168.20.20\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/image-1-1024x683.png\",\"datePublished\":\"2026-05-01T15:13:32+00:00\",\"dateModified\":\"2026-05-02T12:06:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\\\/#primaryimage\",\"url\":\"http:\\\/\\\/192.168.20.20\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/image-1-1024x683.png\",\"contentUrl\":\"http:\\\/\\\/192.168.20.20\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/image-1-1024x683.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/eryann.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fiche Initialisation Switch Cisco &#8211; ssh et s\u00e9curisation de base\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#website\",\"url\":\"https:\\\/\\\/eryann.fr\\\/\",\"name\":\"Eryann Breizh SecOps\",\"description\":\"Fiches techniques &amp; labs en syst\u00e8mes et r\u00e9seaux poor les \u00e9tudiants en BTS CEIL ET SIO\",\"publisher\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eryann.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\",\"name\":\"Breizh Sec Ops\",\"url\":\"https:\\\/\\\/eryann.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/eryann.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png\",\"contentUrl\":\"https:\\\/\\\/eryann.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png\",\"width\":1246,\"height\":229,\"caption\":\"Breizh Sec Ops\"},\"image\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/person\\\/d2ee98d2385cd045ed4fe1c07ca320b5\",\"name\":\"wpadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"caption\":\"wpadmin\"},\"sameAs\":[\"https:\\\/\\\/eryann.fr\"],\"url\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/author\\\/wpadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fiche Initialisation Switch Cisco - ssh et s\u00e9curisation de base - Eryann Breizh SecOps","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\/","og_locale":"fr_FR","og_type":"article","og_title":"Fiche Initialisation Switch Cisco - ssh et s\u00e9curisation de base - Eryann Breizh SecOps","og_description":"Dans un contexte o\u00f9 les \u00e9quipements r\u00e9seau sont des points critiques du syst\u00e8me d\u2019information, il est essentiel de s\u00e9curiser leur acc\u00e8s d\u00e8s leur mise en service. Par d\u00e9faut, un switch peut \u00eatre expos\u00e9 \u00e0 des connexions non s\u00e9curis\u00e9es ou \u00e0 des tentatives d\u2019acc\u00e8s non contr\u00f4l\u00e9es. Cette fiche pr\u00e9sente une configuration de base permettant de mettre [&hellip;]","og_url":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\/","og_site_name":"Eryann Breizh SecOps","article_published_time":"2026-05-01T15:13:32+00:00","article_modified_time":"2026-05-02T12:06:58+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/image-1.png","type":"image\/png"}],"author":"wpadmin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wpadmin","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\/#article","isPartOf":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\/"},"author":{"name":"wpadmin","@id":"https:\/\/eryann.fr\/#\/schema\/person\/d2ee98d2385cd045ed4fe1c07ca320b5"},"headline":"Fiche Initialisation Switch Cisco &#8211; ssh et s\u00e9curisation de base","datePublished":"2026-05-01T15:13:32+00:00","dateModified":"2026-05-02T12:06:58+00:00","mainEntityOfPage":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\/"},"wordCount":905,"commentCount":0,"publisher":{"@id":"https:\/\/eryann.fr\/#organization"},"image":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\/#primaryimage"},"thumbnailUrl":"http:\/\/192.168.20.20\/wp-content\/uploads\/2026\/05\/image-1-1024x683.png","keywords":["cisco"],"articleSection":["Cisco","R\u00e9seau"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\/","url":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\/","name":"Fiche Initialisation Switch Cisco - ssh et s\u00e9curisation de base - Eryann Breizh SecOps","isPartOf":{"@id":"https:\/\/eryann.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\/#primaryimage"},"image":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\/#primaryimage"},"thumbnailUrl":"http:\/\/192.168.20.20\/wp-content\/uploads\/2026\/05\/image-1-1024x683.png","datePublished":"2026-05-01T15:13:32+00:00","dateModified":"2026-05-02T12:06:58+00:00","breadcrumb":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\/#primaryimage","url":"http:\/\/192.168.20.20\/wp-content\/uploads\/2026\/05\/image-1-1024x683.png","contentUrl":"http:\/\/192.168.20.20\/wp-content\/uploads\/2026\/05\/image-1-1024x683.png"},{"@type":"BreadcrumbList","@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-switch-cisco-ssh-et-securisation-de-base\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/eryann.fr\/"},{"@type":"ListItem","position":2,"name":"Fiche Initialisation Switch Cisco &#8211; ssh et s\u00e9curisation de base"}]},{"@type":"WebSite","@id":"https:\/\/eryann.fr\/#website","url":"https:\/\/eryann.fr\/","name":"Eryann Breizh SecOps","description":"Fiches techniques &amp; labs en syst\u00e8mes et r\u00e9seaux poor les \u00e9tudiants en BTS CEIL ET SIO","publisher":{"@id":"https:\/\/eryann.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eryann.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/eryann.fr\/#organization","name":"Breizh Sec Ops","url":"https:\/\/eryann.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/eryann.fr\/#\/schema\/logo\/image\/","url":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png","contentUrl":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png","width":1246,"height":229,"caption":"Breizh Sec Ops"},"image":{"@id":"https:\/\/eryann.fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/eryann.fr\/#\/schema\/person\/d2ee98d2385cd045ed4fe1c07ca320b5","name":"wpadmin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","caption":"wpadmin"},"sameAs":["https:\/\/eryann.fr"],"url":"https:\/\/eryann.fr\/index.php\/author\/wpadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/12","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":4,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/12\/revisions"}],"predecessor-version":[{"id":19,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/12\/revisions\/19"}],"wp:attachment":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/media?parent=12"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/categories?post=12"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/tags?post=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}