5.2.1.4 Packet Tracer - Configuring SSH Instruction.doc -...

This preview shows page 1 - 2 out of 2 pages.

Packet Tracer - Configuring SSHTopologyAddressing TableDeviceInterfaceIP AddressSubnet MaskS1VLAN 110.10.10.2255.255.255.0PC1NIC10.10.10.10255.255.255.0ObjectivesPart 1: Secure PasswordsPart 2: Encrypt CommunicationsPart 3: Verify SSH ImplementationBackgroundSSH should replace Telnet for management connections. Telnet uses insecure plain text communications.SSH provides security for remote connections by providing strong encryption of all transmitted data betweendevices. In this activity, you will secure a remote switch with password encryption and SSH.Part 1:Secure Passwordsa.Using the command prompt onPC1, Telnet toS1. The user EXEC and privileged EXEC password iscisco.b.Save the current configuration so that any mistakes you might make can be reversed by toggling thepower forS1.c.Show the current configuration and note that the passwords are in plain text. Enter the command thatencrypts plain text passwords.

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 2 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
Golay
Tags
Cryptography, IP address, Subnetwork, Secure Shell, Telnet

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture