Securing Router Logins with SSH: Difference between revisions
No edit summary |
No edit summary |
||
Line 6: | Line 6: | ||
'''DAN MARTINEAU''' | '''DAN MARTINEAU''' | ||
'''MIKE | '''MIKE GARIN''' | ||
==Checking Router Bin file== | ==Checking Router Bin file== | ||
Line 90: | Line 90: | ||
*Step 8 | *Step 8 | ||
'''line console 0''' | '''line console 0''' | ||
Line 103: | Line 102: | ||
*Step 9 | *Step 9 | ||
'''line aux 0''' | '''line aux 0''' | ||
'''no password''' | '''no password''' | ||
Line 120: | Line 117: | ||
*Step 10 | *Step 10 | ||
'''line vty 0 4''' | '''line vty 0 4''' | ||
'''login local''' | '''login local''' | ||
Line 146: | Line 141: | ||
*Step 12 | *Step 12 | ||
'''cry key generate rsa''' | '''cry key generate rsa''' | ||
Line 163: | Line 157: | ||
*Step 13 | *Step 13 | ||
'''ip ssh time-out (number)''' | '''ip ssh time-out (number)''' | ||
Latest revision as of 17:14, 4 May 2010
Securing Router Logins with SSH This is a walk through to help new students learn how to configure a more secure login with a router and utilize SSH.
ADAM NELSON
DAN MARTINEAU
MIKE GARIN
Checking Router Bin file
This is a check to ensure that the router you are using is going to run SSH.
- Step 1
Issue the command show flash, to check and see if K9 is in the bin file
Router Configuration
This will cover the commands needed to setup the router logins and SSH.
- Step 1
enaable
- Step 2
config t
- Step 3
hostname (name)
- Step 4
security passwords min-length (number), we used 10 for a password length of 10 characters.
- Step 5
eable secret (password)
- Step 6
no enable password to clear passwords that may already be set.
- Step 7
user (name) secret (password) this will be your user name and password for loging in to the router and SSH.
- Step 8
line console 0
login local
- Step 9
line aux 0
no password
login local
- Step 10
line vty 0 4
login local
transport input ssh this last command is to use ssh and not telnet.
- Step 11
ip domain-name (domain name)
- Step 12
cry key generate rsa
(360-2048) you will use this to set the size of the key the larger the more secure.
- Step 13
ip ssh time-out (number)
ip ssh authentication-retries (number)
SSH Through Putty
- Step 1
You will login using the IP of the router you are connecting to.
- Step 2
Login using the user name and password created previously.
Go to enable mode and enter your password. You are now using secure SSH.