Question : Configure SSH and deny Telnet

I am configuring a group of 2950 switches to do the following:  ( realizing the the ACLs more than likely need to go on the routers).
 
   -Allow Telnet access from 172.30.9.* and 172.30.1.* and deny everybody else inside and outside.
   -Allow SSH access from 172.16.*.*, 172.21.*.*, 172.30.*.*, 172.22.*.*, 172.20.*.* and 172.24.*.* and deny anything outside the network.

I found some info in other posts regarding specifying a domain name (ip domain-name blah.com) and creating crypto keys....however, from a global configuration prompt, "crypto" returns an unrecognized command.  Also, attempting to put "transport input ssh" under my line vty 0 4 isn't possible.  SSH isn't listed as an input protocol or a preferred protocol.

Please provide insight along with commands on how to configure this the way I've specified.

Thank you

Answer : Configure SSH and deny Telnet

Here's a reference guide with step-by-step.
http://www.cisco.com/en/US/products/hw/switches/ps628/products_configuration_guide_chapter09186a00801cde5f.html#92485
* The SSH server and the SSH client are supported only on DES (56-bit) and 3DES (168-bit) data encryption software.

You have to have the crypto version of the switch IOS
"show ver" if you don't see "k9" in the image file name, you don't have crypto.
Random Solutions  
 
programming4us programming4us