That is the documentation for the essential setup:
https://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/configuration/information/cli_rel_4_1/Cisco_Nexus_5000_Series_Switch_CLI_Software_Configuration_Guide_chapter20.html
That’s for a really outdated model so there could also be some adjustments in newer releases of the NXOS software program however the primary instructions ought to be just about the identical.
You might must set a hostname for the change after which allow the SSH function set. The change might include a default key already setup but when not, it’s essential to have it generate a key for it to make use of to start out the SSH service:
change# configure terminal
change(config)# hostname switch1
switch1(config)# function ssh
switch1(config)# ssh key rsa 2048
switch1(config)# exit
As soon as these are carried out, it is best to have the ability to entry the change through SSH. You may additionally must create person accounts for extra customers outdoors of the admin person account.
It’s also possible to create keys related to new person accounts, that’s lined within the documentation I linked.
Relying on the mannequin of change you could have, you could be utilizing a Administration community interface for administration entry to the change. You have to to verify the Administration community interface is configured for the correct IP tackle settings and default route so as to make it reachable out of your networks.
If you’re utilizing the Administration community interface, this web page has a pleasant, concise information on the setup of the Administration interface for a primary community design:
https://humairahmed.com/weblog/?p=6337
Have a look there and see if it matches your expectations.
If you wish to use Layer-3 Swap Digital Interfaces (SVI) on the change, you will have to allow the function set for that:
change# configure terminal
switch1(config)# function interface-vlan
switch1(config)# exit
After which create and configure desired VLANs and VLAN Interfaces:
change# configure terminal
switch1(config)# vlan 500
switch1(config)# interface vlan 500
switch1(config)# ip tackle 10.10.10.1/24
switch1(config)# no shutdown
switch1(config)# exit
That’s an instance for a VLAN quantity 500 and related Layer-3 interface with IP tackle configuration. You would need to use that VLAN on some change interface to attach gadgets that want entry to that community. By default, these gadgets (as soon as on-line) will have the ability to join through SSH to the IP tackle of the VLAN Interface (10.10.10.1). To dam entry through SSH to the change SVI IP addresses, you would wish to create entry lists that block or limit site visitors to port 22 destined to the change IP addresses.