Use Secure Shell version 2 (SSHv2) to enable secure communications support over a network for authentication, encryption, and network Integrity.
Disable the sshd daemon. All SSHv2 commands, except enable, require that you disable the sshd daemon.
Set the user access level to read/write/all community strings.
Disable all nonsecure access services. As a best practice, disable the following services: Trivial File Transfer Protocol (TFTP), File Transfer Protocol (FTP), and Telnet. For more information about disabling access services, see Enable Remote Access Services.
Use the console port to configure the SSHv2 parameters.