Securing Router Logins with SSH: Difference between revisions

From ITCwiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
(5 intermediate revisions by the same user not shown)
Line 1: Line 1:
'''Securing Router Logins with SSH'''This is a walk through to help new students learn how to configure a more secure login with a router and utilize SSH.
'''Securing Router Logins with SSH''' This is a walk through to help new students learn how to configure a more secure login with a router and utilize SSH.
 
 
'''ADAM NELSON'''
 
'''DAN MARTINEAU'''
 
'''MIKE GARIN'''


==Checking Router Bin file==
==Checking Router Bin file==
Line 9: Line 16:




[[File:Wireshark.29.jpg|800px]]
[[File:ssh.1.jpg|800px]]




Line 23: Line 30:




[[File:Wireshark.29.jpg|800px]]
[[File:ssh.ena.jpg|800px]]




Line 32: Line 39:




[[File:Wireshark.30.jpg|800px]]
[[File:ssh.config.jpg|800px]]




Line 41: Line 48:




[[File:Wireshark.31.jpg|800px]]
[[File:ssh.hostname.jpg|800px]]




Line 50: Line 57:




[[File:Wireshark.32.jpg|800px]]
[[File:ssh.passlength.jpg|800px]]




Line 59: Line 66:




[[File:Wireshark.33.jpg|800px]]
[[File:ssh.enablesecret.jpg|800px]]




Line 68: Line 75:




[[File:Wireshark.32.jpg|800px]]
[[File:ssh.clearpass.jpg|800px]]




Line 77: Line 84:




[[File:Wireshark.33.jpg|800px]]
[[File:ssh.userpass.jpg|800px]]




Line 83: Line 90:
*Step 8
*Step 8
'''line console 0'''
'''line console 0'''




Line 90: Line 96:




[[File:Wireshark.32.jpg|800px]]
[[File:ssh.lineconsole.jpg|800px]]




Line 96: Line 102:
*Step 9
*Step 9
'''line aux 0'''
'''line aux 0'''




'''no password'''
'''no password'''




Line 107: Line 111:




[[File:Wireshark.33.jpg|800px]]
[[File:ssh.lineaux.jpg|800px]]




Line 113: Line 117:
*Step 10
*Step 10
'''line vty 0 4'''
'''line vty 0 4'''




'''login local'''
'''login local'''




Line 124: Line 126:




[[File:Wireshark.32.jpg|800px]]
[[File:ssh.linevty.jpg|800px]]




Line 133: Line 135:




[[File:Wireshark.33.jpg|800px]]
[[File:ssh.domainname.jpg|800px]]




Line 140: Line 142:
'''cry key generate rsa'''
'''cry key generate rsa'''


'''(360-2048)''' you will use this to set the size of the key the larger the more secure.




'''(360-2048)''' you will use this to set the size of the key the larger the more secure.
 
[[File:ssh.keygen.jpg|800px]]






[[File:Wireshark.32.jpg|800px]]
[[File:ssh.bits.jpg|800px]]




Line 152: Line 157:
*Step 13
*Step 13
'''ip ssh time-out (number)'''
'''ip ssh time-out (number)'''




Line 159: Line 163:




[[File:Wireshark.33.jpg|800px]]
[[File:ssh.timeoutretries.jpg|800px]]
 
 
 
==Examining Capture Data==
In this section we will be showing you how to capture protocols and where to locate the important values given by the use of wireshark.
 
===Color Code===
*YELLOW:  Indicates the MAC Address of both the destination and source.
*GREEN:  Indicates the NIC Manufacturer of both the destination and source.
*RED:  Indicates the NIC Serial Number of both the destination and source.
*BLUE:  Indicates the Frame Type of the packet.
*PINK:  Indicates the IPv4 of both the destination and source.
*'''NOTE''':  The the '''Preamble''' and the '''FCS''' are '''NOT''' shown on wireshark.
 
===FTP===
 
 
 
[[File:Wireshark.ftp..jpg|800px]]
 
 
 
===HTTP===
 
 
 
[[File:Wireshark.http.jpg|800px]]
 
 
 
===ARP===
 
 
 
[[File:Wireshark.arp.jpg|800px]]
 
 
 
===DNS===
 
 
 
[[File:Wireshark.dns.jpg|800px]]
 
 
 
===ICMP===
 
 


[[File:Wireshark.icmp.JPG|800px]]




 
==SSH Through Putty==
==Creating a Shortcut to Auto Run Wireshark==
In this section we will be showing you how to create a new desktop icon to auto start your wireshark and have it select the correct network adapter and start capturing by simply double clicking the new icon.
 
*Step 1
*Step 1
Right click the Wireshark icon and click copy.
You will login using the IP of the router you are connecting to.




 
[[File:ssh.2.jpg|800px]]
[[File:Wireshark.copy.JPG|800px]]






*Step 2
*Step 2
Right click on the desktop and click paste.
Login using the user name and password created previously.


*Step 3
Right click the new icon and rename "Wireshark Auto Start"




Go to enable mode and enter your password.  You are now using secure SSH.


[[File:Wireshark.new.JPG|800px]]




 
[[File:ssh.3.jpg|800px]]
*Step 4
Open Wireshark and click on the Capture Options go to the pull down as previously mentioned and select the VMware network adapter, open the window fully to see the path and select everything after the after the : you should have this selected '''\Device\NPF_{numbers}''' as seen in the picture.
 




[[File:Wireshark.loctarget.JPG|800px]]
*Step 5
Right click and click properties on the NEW Wireshark icon, and add this to the end of the target line -k -i
*'''NOTE''':  You need to have a space before the -k and after the -i.
[[File:Wireshark.shortcutcmd.JPG|800px]]
*Step 6
Now after the -i "and the space" paste the \Device\NPF_[numbers} to the target line as shown in the picture.
[[File:Wireshark.paste.JPG|800px]]
*Step 7
Click on the Ok button and now you can simply double click the new icon to start Wireshark and select your network adapter and begin capture with one click of the button.  Enjoy!!!


==External links==
==External links==
*[[VMWare Setup]]
*[http://www.cisco.com/en/US/tech/tk583/tk617/technologies_tech_note09186a00800949e2.shtml Cisco Info]
*[http://www.wireshark.org/download.html Wireshark Download]
*[http://media-2.cacetech.com/video/wireshark/custom-shortcuts/ Creating Shortcuts]

Latest revision as of 17:14, 4 May 2010

Securing Router Logins with SSH This is a walk through to help new students learn how to configure a more secure login with a router and utilize SSH.


ADAM NELSON

DAN MARTINEAU

MIKE GARIN

Checking Router Bin file

This is a check to ensure that the router you are using is going to run SSH.

  • Step 1

Issue the command show flash, to check and see if K9 is in the bin file


Ssh.1.jpg



Router Configuration

This will cover the commands needed to setup the router logins and SSH.

  • Step 1

enaable


Ssh.ena.jpg


  • Step 2

config t


Ssh.config.jpg


  • Step 3

hostname (name)


Ssh.hostname.jpg


  • Step 4

security passwords min-length (number), we used 10 for a password length of 10 characters.


Ssh.passlength.jpg


  • Step 5

eable secret (password)


Ssh.enablesecret.jpg


  • Step 6

no enable password to clear passwords that may already be set.


Ssh.clearpass.jpg


  • Step 7

user (name) secret (password) this will be your user name and password for loging in to the router and SSH.


Ssh.userpass.jpg


  • Step 8

line console 0


login local


Ssh.lineconsole.jpg


  • Step 9

line aux 0


no password


login local


Ssh.lineaux.jpg


  • Step 10

line vty 0 4


login local


transport input ssh this last command is to use ssh and not telnet.


Ssh.linevty.jpg


  • Step 11

ip domain-name (domain name)


Ssh.domainname.jpg


  • Step 12

cry key generate rsa


(360-2048) you will use this to set the size of the key the larger the more secure.


Ssh.keygen.jpg


Ssh.bits.jpg


  • Step 13

ip ssh time-out (number)


ip ssh authentication-retries (number)


Ssh.timeoutretries.jpg


SSH Through Putty

  • Step 1

You will login using the IP of the router you are connecting to.


Ssh.2.jpg


  • Step 2

Login using the user name and password created previously.


Go to enable mode and enter your password. You are now using secure SSH.


Ssh.3.jpg


External links