5.2.1.4 Packet Tracer u2013 Configuring SSH-Amyan...

This preview shows page 1 - 2 out of 3 pages.

Packet Tracer - Configuring SSH Addressing Table Device Interface IP Address Subnet Mask S1 VLAN 1 10.10.10.2 255.255.255.0 PC1 NIC 10.10.10.10 255.255.255.0 Objectives Part 1: Secure Passwords Part 2: Encrypt Communications Part 3: Verify SSH Implementation Background SSH should replace Telnet for management connections. Telnet uses insecure plain text communications. SSH provides security for remote connections by providing strong encryption of all transmitted data between devices. In this activity, you will secure a remote switch with password encryption and SSH. Part 1: Secure Passwords a. Using the command prompt on PC1 , Telnet to S1 . The user EXEC and privileged EXEC password is cisco . Packet Tracer PC Command Line 1.0 PC>telnet 10.10.10.2 Trying 10.10.10.2 …Open User Access Verification Password: S1>en Password: S1# b. Save the current configuration so that any mistakes you might make can be reversed by toggling the power for S1 . S1#copy running-config startup-config Destination filename [startup-config]?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture