0% found this document useful (0 votes)
91 views3 pages

SSH

The document describes configuring SSH and authentication on two devices, R1forAPOS and S1forAPOS. On each device, 1024-bit RSA keys are generated, SSH version 2 is enabled, local username/password authentication is configured, and the configurations are written to NVRAM.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views3 pages

SSH

The document describes configuring SSH and authentication on two devices, R1forAPOS and S1forAPOS. On each device, 1024-bit RSA keys are generated, SSH version 2 is enabled, local username/password authentication is configured, and the configurations are written to NVRAM.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

R1forAPOS>enable

R1forAPOS#conf t
Enter configuration commands, one per line. End with CNTL/Z.
R1forAPOS(config)#crypto key generate rsa
% You already have RSA keys defined named R1forAPOS.asoi.gsu.by .
% Do you really want to replace them? [yes/no]: yes
The name for the keys will be: R1forAPOS.asoi.gsu.by
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.

How many bits in the modulus [512]: 1024


% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]

R1forAPOS(config)#ip ssh version 2


*мар 1 1:53:46.810: %SSH-5-ENABLED: SSH 1.99 has been enabled
R1forAPOS(config)#username admin privelege 15 password admin
^
% Invalid input detected at '^' marker.
R1forAPOS(config)#username admin privlege 15 password admin
^
% Invalid input detected at '^' marker.
R1forAPOS(config)#username admin privilege 15 password admin
R1forAPOS(config)#do wr
Building configuration...
[OK]
R1forAPOS(config)#aaa new-model
R1forAPOS(config)#line vty 0 4
R1forAPOS(config-line)#transport input ssh
R1forAPOS(config-line)#login local
AAA is enabled. Command not supported. Use an aaa authentication methodlist
R1forAPOS(config-line)#exit
R1forAPOS(config)#no aaa new-model
R1forAPOS(config)#line vty 0 4
R1forAPOS(config-line)#login local
R1forAPOS(config-line)#exit
R1forAPOS(config)#enable secret cisco
R1forAPOS(config)#do wr
Building configuration...
[OK]
R1forAPOS(config)#username cisco password cisco
R1forAPOS(config)#do wr
Building configuration...
[OK]
Switch>en
Switch#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#host S1forAPOS
S1forAPOS(config)#crypto key generate rsa
% Please define a domain-name first.
S1forAPOS(config)#ip domain-name ASOI
S1forAPOS(config)#ip domain-name asoi.gsu.by
S1forAPOS(config)#crypto key generate rsa
The name for the keys will be: S1forAPOS.asoi.gsu.by
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.

How many bits in the modulus [512]: 1024


% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]

S1forAPOS(config)#ip ssh version 2


*мар 1 0:7:54.607: %SSH-5-ENABLED: SSH 1.99 has been enabled
S1forAPOS(config)#username admin privilege 15 password admin
S1forAPOS(config)#do wr
Building configuration...
[OK]
S1forAPOS(config)#aaa new-model
^
% Invalid input detected at '^' marker.
S1forAPOS(config)#ip ssh show
^
% Invalid input detected at '^' marker.
S1forAPOS(config)#show ip ssh
^
% Invalid input detected at '^' marker.
S1forAPOS(config)#aaa new-model
^
% Invalid input detected at '^' marker.
S1forAPOS(config)#line vty 0 4
S1forAPOS(config-line)#transport input ssh
S1forAPOS(config-line)#login local
S1forAPOS(config-line)#exit
S1forAPOS(config)#no aaa new-model
^
% Invalid input detected at '^' marker.
S1forAPOS(config)#line vty 0 4
S1forAPOS(config-line)#login local
S1forAPOS(config-line)#exit
S1forAPOS(config)#enable secret cisco
S1forAPOS(config)#do wr
Building configuration...
[OK]
S1forAPOS(config)#username cisco1 password cisco
S1forAPOS(config)#do wr
Building configuration...
[OK]

You might also like