5.2.1.4 Packet Tracer - Configuring SSH

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
hi friends welcome to all in this video we are going to see the packet tracer activity configuring SSH and this packet tracer activity is from a CCNA routing and switching module to in this packet tracer activity we are going to a secure passwords and to encrypt communications finally we are going to verify SSH implementation we will come to path to one secure passwords using the command prompt on PC one tell me - yes 1 the user x''k and to privilege to exit bus word is cisco before going to tell net on pc 1 here we can see the IP address off is 1 that is a tent or 10.10 dot is a cisco we will come to pc 1 now you give telnet and the IP address yes now it's asking for the password yes so now here the tality is working we will go to be save the current configuration so that any mistakes you might make can be reversed by toggling the power for s1 so we will serve the current configuration on s1 we will come to yes 1 and we will try on a CL but you keep this CLI tab is locked on s1 so we will go to PC one here is our telnet we can access a s1 through this PC so we are going to you enable password is cisco here we are going to copy running to startup config yes now we will go to the next it is C show the current configuration and note that the passwords are in plain text enter the command that encrypts the plaintext passwords ok we will check the current configuration and we can encrypt the plaintext password using the service password encryption we will come to PC one command prompt so we are going to give the command show running config and here we can see the password is cisco and it is a plaintext password you can see the vty password even line console password also we can see a cisco and line vty password is also a plaintext password now we are going to encrypt all these passwords configure terminal service password encryption now we will verify the running config show running config yes now we can see passwords are encrypted line control password is encrypted also vty password also encrypted verify that to the passwords are encrypted yes we verified now we will come to party to encrypt communications in that step one I set the IP domain name and to generate a secure keys it is generally not safe to use telnet because the data is a transfer in plaintext therefore use SSH whenever it is available configure the domain name to be netacad dot PKA yes we will set this a domain name first we will come to PC one command throw and configure terminal here we are going to set IP domain name as netacad door 2 PK a now we will come to be secure keys are needed to encrypt the data generate the RSA keys using it 10 20 40 length okay we will come to PC 1 okay we will set crypto key generate RSA until here we are going to give us the told 1024 we have to set by default it is vital here we are going to set to 1024 yes now we will come to a step to create an SSH user and reconfigure the VD by lines for SSH only access create an administrator user with Cisco as the secret password yes we will set this user with secret password Cisco we will come to PC one command prompt yes here we are going to create the username administrator ensure the secret of Cisco now we will come to be configure the vty lines to check the local user name database for login credentials and to only allow SSH for remote access remove the existing VT by line password yes we will do this now we will come to PC 1 yes so here we are going to keep we have to go to this vty so line vty I am going to give 0 to 15 and here we are going to give you a login local and here we are going to give transport input yes assets and we are going to disable the password of Cisco yes now we will come to part 2 3 your verify is a search implementation we exceed the telnet session and attempt to log back in using telnet the attempt it should fail yes we will try this coming to PC 1 we are going to exit yes now I am going to login using telnet again you can see connection to 10 dot and dot and or too close to buy foreign host once more we will try now we unable to connect to this switch next is attempt to login using SSH type SH and press Enter without any parameters to reveal the command usage instructions hint here we can see this is the letter Y L not the number one okay so we will give SSH and we will press enter back to PC one here we are going to type SSH here we can see we have to give SSH - L username we have to specify and we have to specify the target now we will key you ESS it - CL and we have the username is administrator and - the target is the Tendo tender tender - yes so the password is Cisco yes here we can see now we are in such interference that last step upon a successful login enter privileged x ik mode and save the configuration if you were unable to successfully access s1 toggle the power and you begin again at part one yes we able to login into SSH I mean into s1 so now we will just save the configuration coming to PC one ok here the password is Cisco now we are going to give a copy running to startup yes well a great job so in this packet tracer activity we have seen how to configure yes SH fronts if you have any doubt - please comment below also if you like to get my future video information into your Gmail you can subscribe my channel right now stay tuned take care bye bye
Info
Channel: Tech Acad
Views: 79,824
Rating: undefined out of 5
Keywords: SSH
Id: O6DvLz9AXXo
Channel Id: undefined
Length: 10min 2sec (602 seconds)
Published: Sun Jun 11 2017
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.