Objectives: Part 1: Secure Passor!s Part 2: "ncr#$t Co%%unications Part &: 'erif# SSH (%$)e%entation Observation: Part 1: Secure Passor!s *se t+e co%%an! $ro%$t on PC1, an! t+en t+e co%%an! Te)net to S1. T+e user "-"C an! $rivi)ege! "-"C $assor! is cisco. Save t+e current configuration to t+e S1. *se t+e co%%an! show run to s+o t+e current configuration an! it s+os t+at t+e $assor!s are in $)ain te.t. *se t+e co%%an! service password-encryption t+at encr#$ts $)ain te.t $assor!s. Part 2: "ncr#$t Co%%unications Configure t+e !o%ain na%e to netaca!.$ka b# using t+e co%%an! i$ !o%ain-na%e netaca!.$ka. ( use! t+e co%%an! crypto key generate rsa. ( generate! t+e /SA ke#s using a 1024 ke# )engt+. ( create! an a!%inistrator user it+ a cisco as t+e $assor! b# using t+e co%%an! username administrator password cisco. ( configure! t+e 'T1 )ines to c+eck t+e )oca) userna%e !atabase for )ogin cre!entia)s an! to on)# a))o SSH for re%ote access b# using t+e co%%an! login local an! transport input ssh.
Conc)usion: Secure S+e)) 2SSH3 is a $rotoco) t+at $rovi!es a secure 2encr#$te!3 %anage%ent connection to a re%ote !evice. SSH s+ou)! re$)ace Te)net for %anage%ent connections. Te)net is an o)!er $rotoco) t+at uses insecure $)ainte.t trans%ission of bot+ t+e )ogin aut+entication 2userna%e an! $assor!3 an! t+e !ata trans%itte! beteen t+e co%%unicating !evices. SSH $rovi!es securit# for re%ote connections b# $rovi!ing strong encr#$tion +en a !evice is aut+enticate! 2userna%e an! $assor!3 an! a)so for t+e trans%itte! !ata beteen t+e co%%unicating !evices.