8.5.3.5 Packet Tracer - Configuring SSH.docx - Packet...

This preview shows page 1 - 2 out of 2 pages.

Packet Tracer - Configuring SSHTopologyAddressing TableDeviceInterfaceIP AddressSubnet MaskS1VLAN 110.10.10.2255.255.255.0PC1NIC10.10.10.10255.255.255.0ObjectivesPart 1: Secure PasswordsPart 2: Encrypt CommunicationsPart 3: Verify SSH ImplementationBackgroundSSH should replace Telnet for management connections. Telnet uses insecure plain text communications.SSH provides security for remote connections by providing strong encryption of all transmitted data betweendevices. In this activity, you will secure a remote switch with password encryption and SSH.Part 1: Secure Passwordsa.Using the command prompt onPC1, Telnet toS1. The user EXEC and privileged EXEC password iscisco.PC>telnet 10.10.10.2Trying 10.10.10.2 ...OpenUser Access VerificationPassword:S1>enPassword:S1#b.Save the current configuration so that any mistakes you might make can be reversed by toggling thepower forS1.S1#copy running-config startup-configDestination filename [startup-config]?

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 2 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
Susan Cease
Tags
Cryptography, IP address, Secure Shell, Telnet

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture