Net 412 (Practical Part) LAB 4 - SSH

Slides:



Advertisements
Similar presentations
Cisco Router. Overview Understanding and configuring the Cisco Internetwork Operating System (IOS) Connecting to a router Bringing up a router Logging.
Advertisements

1 CCNA 2 v3.1 Module 3. 2 CCNA 2 Module 3 Configuring a Router.
Introduction to the Cisco IOS
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-1 Minimizing Service Loss and Data Theft Securing Network Services.
© 2007 Cisco Systems, Inc. All rights reserved.ICND2 v1.0—1-1 Small Network Implementation Introducing the Review Lab.
Chapter 2: Basic Router Configuration
© Wiley Inc All Rights Reserved. CHAPTER 4: Introduction to the Cisco IOS CCNA: Cisco Certified Network Associate Study Guide.
Instructor & Todd Lammle
CSE 304 Computer network lab lecture 02
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 1 – Chapter 9 Ethernet Switch Configuration 1.
Basic Router Configuration 1.1 Global configuration Cisco allows us to configure the router to support various protocols and interfaces. The router stores.
User Access to Router Securing Access.
Module 4: Learning about Other Devices These Labs can be performed using the following topology or using the ones in the lab books: Creating a Network.
NETWORK ADMINISTRATION CPIT 470 Instructor: Mrs Aisha Ehsan.
NetPro-ITI Ethernet LANs
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Sybex CCNA Chapter 6: Cisco’s IOS Instructor & Todd Lammle.
Jose Luis Flores / Amel Walkinshaw
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—2-1 Ethernet LANs Understanding Switch Security.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Understanding Cisco Router Security.
Chapter 4 Internetworking Operating System )IOS) and Security Device Manager (SDM)
 Router Configurations part1 2 nd semester
Instructor Materials Chapter 8 Configuring Cisco Devices
Managing a Cisco Devices Internetwork
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
Cisco configuration elelements
Using a Cisco Router as a DHCP Server
WAN Connections.
© 2002, Cisco Systems, Inc. All rights reserved.
Chapter 6 Cisco’s Internetworking Operating System (IOS)
Instructor Materials Chapter 5 Providing Network Services
Instructor Materials Chapter 2: Configure a Network Operating System
Lec5: Applying Dynamic Routing Protocols in CISCO Packet Tracer
CISCO CERTIFIED NETWORK ASSOCIATE
Chapter 2: Configure a Network Operating System
Understanding Switch Security
Operating & Configuring a Cisco IOS Device
Introduction to Cisco IOS -(Internetwork Operating System)
© 2002, Cisco Systems, Inc. All rights reserved.
Chapter 5: Switch Configuration
Instructor & Todd Lammle
Cisco Switching Basics
Cisco Want to Pass CCNA Cisco Certified Network Associate Exam
Cisco configuration elements
Introduction to Networking
Securing Access.
© 2011 ITT Educational Services Inc.
Basic switch and router configuration
Understanding Switch Security
Chapter 5: Switch Configuration
– Chapter 3 – Device Security (B)
Net 412 (Practical Part) Networks and Communication Department LAB 2.
Net 412 (Practical Part) LAB 5-port security
Chapter 2: Configure a Network Operating System
Net 412 (Practical Part) LAB 3 - Telnet
Understanding Cisco Router Security
Configuring a Router Module 3 Semester 2.
Chapter 5: Switch Configuration
– Chapter 3 – Device Security (B)
Routers & Cisco IOS.
Net 412 (Practical Part) Networks and Communication Department LAB 1.
Lecture#3: Configuring a Network Operating System
Fundamentals of Computer Networks
Fundamentals of Computer Networks
Lock and Key by Linda Wier 2/23/2019.
Introduction to Cisco IOS -(Internetwork Operating System)
Lecture9: Embedded Network Operating System: cisco IOS
Review - week 4 Basic device access security
Lec5: Applying Dynamic Routing Protocols in CISCO Packet Tracer
Lecture9: Embedded Network Operating System: cisco IOS
Presentation transcript:

Net 412 (Practical Part) LAB 4 - SSH Networks and Communication Department LAB 4 - SSH

Enable SSH on Cisco Router Secure Shell or SSH is a secure protocol and the replacement for Telnet and other insecure remote shell protocols. So for secure communication between network devices, always use SSH instead of Telnet. Configure SSH on Cisco routers and switches with the below step by step guide to SSH configuration. Networks and Communication Department

Topology Networks and Communication Department

Configure PC0 Networks and Communication Department

1. Open the router R1 console line and create IP , domain and user name. Router>en Router#conf t Enter configuration commands, one per line. End with CNTL/Z. Router(config)#int f0/0 Router(config-if)#no shut Router(config-if)#ip add 192.168.1.1 255.255.255.0 Router(config-if)#exit Networks and Communication Department

1. Open the router R1 console line and create IP , domain and user name. R1(config)#ip domain-name pnu.com R1(config)#username Norah Password pass123 // The “ip domain-name” command create a domain and names it pnu.com. // The “username Norah Password Pass123” command just creates a user name “Norah” with “Pass123” password. You can use the domain name so you don't have to type the entire IP address.   For example: Imagine you have an ipv6 or ipv4 and you keep forgetting them. However, you have configured a domain name. You can use that domain name to SSH. Imagine if facebook or google don't have domain names. Everyone has to type the IP address of their network/server to go to their website. That's the use of the domain name. You can also use the domain name if you forgot or just don't like the hastle of typing the ip address. Networks and Communication Department

2. Generating the encryption keys for securing the ssh session: R1(config)#crypto key generate rsa  % Please define a hostname other than Router. Router(config)#hostname SSH SSH(config)#crypto key generate rsa % The name for the keys will be: SSH.pnu.com % Choose the size of the key modulus in the range of 360 to 2048 for your % General Purpose Keys. Choosing a key modulus greater than 512 may take a few minutes. How many bits in the modulus [512]: 1024 % Generating 1024 bit RSA keys, keys will be non- exportable…[OK] Type “crypto key generate rsa” command and press enter, when ask you “How many bits in the modulus [512]:” just type “1024″ and press enter. The system will generate 1024 bits keys to secure session lines. Networks and Communication Department

3.Enable vty lines and configure access protocols. R1(config)#line vty 0 4 R1(config-line)#transport input ssh R1(config-line)#password pass123 R1(config-line)#login R1(config-line)#logging synchronous R1(config-line)#motd-banner R1(config-line)#exit Router(config)#enable password pass123 Router(config)#exit // The configuration is the same as telnet, just the transport input ssh command change the line to Secure Shell. Configuration has completed, next you must test ssh from a client PC. Networks and Communication Department

Testing SSH Connectivity From a client PC, open the command line and type PC>ssh -l Norah 192.168.1.1 Open Password: R1>enable  Password:  R1#conf t Enter configuration commands, one per line. End with CNTL/Z. R1(config)# Networks and Communication Department

Test PC0 Networks and Communication Department

The End Any Questions ? Networks and Communication Department