Packet Tracer - Configure SSH: Addressing Table
Packet Tracer - Configure SSH: Addressing Table
Addressing Table
Device Interface IP Address Subnet Mask
Objectives
Part 1: Secure Passwords
Part 2: Encrypt Communications
Part 3: Verify SSH Implementation
Background
SSH should replace Telnet for management connections. Telnet uses insecure plain text communications.
SSH provides security for remote connections by providing strong encryption of all transmitted data between
devices. In this activity, you will secure a remote switch with password encryption and SSH.
Instructions
2013 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 2 www.netacad.com
b. Save the current configuration so that any mistakes you might make can be reversed by toggling the
power for S1.
c. Show the current configuration and note that the passwords are in plain text. Enter the command that
encrypts plain text passwords:
S1#show running-config
Building configuration...
!
interface Vlan1
ip address 10.10.10.2 255.255.255.0
!
!
!
!
line con 0
2013 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 2 www.netacad.com
!
line vty 0 4
password cisco
login
line vty 5 15
password cisco
login
!
!
!
!
end
S1(config)# service password-encryption
Verify that the passwords are encrypted.
b. Secure keys are needed to encrypt the data. Generate the RSA keys using a 1024 key length.
Step 2: Create an SSH user and reconfigure the VTY lines for SSH-only access.
a. Create an administrator user with cisco as the secret password.
2013 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 2 www.netacad.com
Packet Tracer - Configure SSH
b. Configure the VTY lines to check the local username database for login credentials and to only allow SSH
for remote access. Remove the existing vty line password.
S1(config)#line vty 0 15
S1(config-line)#transport input ssh
S1(config-line)#login local
S1(config-line)#no password cisco
C:\>telnet 10.10.10.2
Trying 10.10.10.2 ...Open
b. Attempt to log in using SSH. Type ssh and press Enter without any parameters to reveal the command
usage instructions. Hint: The -l option is the letter “L”, not the number 1.
Password:
S1>enable
Password:
S1#
c. Upon successful login, enter privileged EXEC mode and save the configuration. If you were unable to
successfully access S1, toggle the power and begin again at Part 1.
Answer Key
config terminal
service password-encryption
ip domain-name netacad.pka
crypto key generate rsa
1024
username administrator secret cisco
line vty 0 15
login local
transport input ssh
no password cisco
2013 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 2 www.netacad.com
2013 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 5 of 2 www.netacad.com