Packet Tracker
Packet Tracker
Answers Note: Red font color or gray highlights indicate text that appears
in the Answers copy only.
Addressing Table
Device Interface IP Address Subnet Mask
Objectives
Part 1: Secure Passwords
Part 2: Encrypt Communications
Part 3: Verify SSH Implementation
Background / Scenario
SSH should replace Telnet for management connections. Telnet uses
insecure plain text communications. SSH provides security for remote
connections by providing strong encryption of all transmitted data between
devices. In this activity, you will secure a remote switch with password
encryption and SSH.
Instructions
Part 1: Secure Passwords
a. Using the command prompt on PC1, Telnet to S1. The user EXEC and
privileged EXEC password is cisco.
Password:
S1> en
Password:
S1#
b. Save the current configuration so that any mistakes you might make can be
reversed by toggling the power for S1.
Building configuration…
[OK]
c. Show the current configuration and note that the passwords are in plain
text.
d. In the global configuration mode, enter the command that encrypts plain
text passwords:
b. Secure keys are needed to encrypt the data. Generate the RSA keys using
a 1024 key length.
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.
Step 2: Create an SSH user and reconfigure the VTY lines for
SSH-only access.
a. Create an administrator user with cisco as the secret password.
b. Configure the VTY lines to check the local username database for login
credentials and to only allow SSH for remote access. Remove the existing vty
line password.
Script
Switch S1
enable
config terminal
service password-encryption
ip domain-name netacad.pka
1024
line vty 0 15
login local
no password cisco
end
Post navigation
← Previous Article
19.2.4 Packet Tracer – Configure Initial Router Settings Answers