Securing Router Logins with SSH: Difference between revisions

From ITCwiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
(6 intermediate revisions by the same user not shown)
Line 1: Line 1:
'''Securing Router Logins with SSH'''This is a walk through to help new students learn how to configure a more secure login with a router and utilize SSH.
'''Securing Router Logins with SSH''' This is a walk through to help new students learn how to configure a more secure login with a router and utilize SSH.
 
 
'''ADAM NELSON'''
 
'''DAN MARTINEAU'''
 
'''MIKE GARIN'''


==Checking Router Bin file==
==Checking Router Bin file==
Line 9: Line 16:




[[File:Wireshark.29.jpg|800px]]
[[File:ssh.1.jpg|800px]]




Line 23: Line 30:




[[File:Wireshark.29.jpg|800px]]
[[File:ssh.ena.jpg|800px]]




Line 32: Line 39:




[[File:Wireshark.30.jpg|800px]]
[[File:ssh.config.jpg|800px]]




Line 41: Line 48:




[[File:Wireshark.31.jpg|800px]]
[[File:ssh.hostname.jpg|800px]]




Line 50: Line 57:




[[File:Wireshark.32.jpg|800px]]
[[File:ssh.passlength.jpg|800px]]




Line 59: Line 66:




[[File:Wireshark.33.jpg|800px]]
[[File:ssh.enablesecret.jpg|800px]]




Line 68: Line 75:




[[File:Wireshark.32.jpg|800px]]
[[File:ssh.clearpass.jpg|800px]]




Line 77: Line 84:




[[File:Wireshark.33.jpg|800px]]
[[File:ssh.userpass.jpg|800px]]




Line 83: Line 90:
*Step 8
*Step 8
'''line console 0'''
'''line console 0'''
'''login local'''
'''login local'''






[[File:Wireshark.32.jpg|800px]]
[[File:ssh.lineconsole.jpg|800px]]




Line 93: Line 102:
*Step 9
*Step 9
'''line aux 0'''
'''line aux 0'''
'''no password'''
'''no password'''
'''login local'''
'''login local'''






[[File:Wireshark.33.jpg|800px]]
[[File:ssh.lineaux.jpg|800px]]




Line 104: Line 117:
*Step 10
*Step 10
'''line vty 0 4'''
'''line vty 0 4'''
'''login local'''
'''login local'''
'''transport input ssh''' this last command is to use ssh and not telnet.
'''transport input ssh''' this last command is to use ssh and not telnet.






[[File:Wireshark.32.jpg|800px]]
[[File:ssh.linevty.jpg|800px]]




Line 118: Line 135:




[[File:Wireshark.33.jpg|800px]]
[[File:ssh.domainname.jpg|800px]]




Line 124: Line 141:
*Step 12
*Step 12
'''cry key generate rsa'''
'''cry key generate rsa'''
'''(360-2048)''' you will use this to set the size of the key the larger the more secure.




 
'''(360-2048)''' you will use this to set the size of the key the larger the more secure.
[[File:Wireshark.32.jpg|800px]]
 




*Step 13
'''ip ssh time-out (number)'''
'''ip ssh authentication-retries (number)'''


[[File:ssh.keygen.jpg|800px]]




[[File:Wireshark.33.jpg|800px]]


[[File:ssh.bits.jpg|800px]]




==Examining Capture Data==
In this section we will be showing you how to capture protocols and where to locate the important values given by the use of wireshark.


===Color Code===
*Step 13
*YELLOW:  Indicates the MAC Address of both the destination and source.
'''ip ssh time-out (number)'''
*GREEN:  Indicates the NIC Manufacturer of both the destination and source.
*RED:  Indicates the NIC Serial Number of both the destination and source.
*BLUE:  Indicates the Frame Type of the packet.
*PINK:  Indicates the IPv4 of both the destination and source.
*'''NOTE''':  The the '''Preamble''' and the '''FCS''' are '''NOT''' shown on wireshark.
 
===FTP===
 
 
 
[[File:Wireshark.ftp..jpg|800px]]




'''ip ssh authentication-retries (number)'''


===HTTP===




[[File:ssh.timeoutretries.jpg|800px]]


[[File:Wireshark.http.jpg|800px]]




 
==SSH Through Putty==
===ARP===
 
 
 
[[File:Wireshark.arp.jpg|800px]]
 
 
 
===DNS===
 
 
 
[[File:Wireshark.dns.jpg|800px]]
 
 
 
===ICMP===
 
 
 
[[File:Wireshark.icmp.JPG|800px]]
 
 
 
==Creating a Shortcut to Auto Run Wireshark==
In this section we will be showing you how to create a new desktop icon to auto start your wireshark and have it select the correct network adapter and start capturing by simply double clicking the new icon.
 
*Step 1
*Step 1
Right click the Wireshark icon and click copy.
You will login using the IP of the router you are connecting to.




 
[[File:ssh.2.jpg|800px]]
[[File:Wireshark.copy.JPG|800px]]






*Step 2
*Step 2
Right click on the desktop and click paste.
Login using the user name and password created previously.


*Step 3
Right click the new icon and rename "Wireshark Auto Start"




Go to enable mode and enter your password.  You are now using secure SSH.


[[File:Wireshark.new.JPG|800px]]




 
[[File:ssh.3.jpg|800px]]
*Step 4
Open Wireshark and click on the Capture Options go to the pull down as previously mentioned and select the VMware network adapter, open the window fully to see the path and select everything after the after the : you should have this selected '''\Device\NPF_{numbers}''' as seen in the picture.
 




[[File:Wireshark.loctarget.JPG|800px]]
*Step 5
Right click and click properties on the NEW Wireshark icon, and add this to the end of the target line -k -i
*'''NOTE''':  You need to have a space before the -k and after the -i.
[[File:Wireshark.shortcutcmd.JPG|800px]]
*Step 6
Now after the -i "and the space" paste the \Device\NPF_[numbers} to the target line as shown in the picture.
[[File:Wireshark.paste.JPG|800px]]
*Step 7
Click on the Ok button and now you can simply double click the new icon to start Wireshark and select your network adapter and begin capture with one click of the button.  Enjoy!!!


==External links==
==External links==
*[[VMWare Setup]]
*[http://www.cisco.com/en/US/tech/tk583/tk617/technologies_tech_note09186a00800949e2.shtml Cisco Info]
*[http://www.wireshark.org/download.html Wireshark Download]
*[http://media-2.cacetech.com/video/wireshark/custom-shortcuts/ Creating Shortcuts]

Latest revision as of 17:14, 4 May 2010

Securing Router Logins with SSH This is a walk through to help new students learn how to configure a more secure login with a router and utilize SSH.


ADAM NELSON

DAN MARTINEAU

MIKE GARIN

Checking Router Bin file

This is a check to ensure that the router you are using is going to run SSH.

  • Step 1

Issue the command show flash, to check and see if K9 is in the bin file


Ssh.1.jpg



Router Configuration

This will cover the commands needed to setup the router logins and SSH.

  • Step 1

enaable


Ssh.ena.jpg


  • Step 2

config t


Ssh.config.jpg


  • Step 3

hostname (name)


Ssh.hostname.jpg


  • Step 4

security passwords min-length (number), we used 10 for a password length of 10 characters.


Ssh.passlength.jpg


  • Step 5

eable secret (password)


Ssh.enablesecret.jpg


  • Step 6

no enable password to clear passwords that may already be set.


Ssh.clearpass.jpg


  • Step 7

user (name) secret (password) this will be your user name and password for loging in to the router and SSH.


Ssh.userpass.jpg


  • Step 8

line console 0


login local


Ssh.lineconsole.jpg


  • Step 9

line aux 0


no password


login local


Ssh.lineaux.jpg


  • Step 10

line vty 0 4


login local


transport input ssh this last command is to use ssh and not telnet.


Ssh.linevty.jpg


  • Step 11

ip domain-name (domain name)


Ssh.domainname.jpg


  • Step 12

cry key generate rsa


(360-2048) you will use this to set the size of the key the larger the more secure.


Ssh.keygen.jpg


Ssh.bits.jpg


  • Step 13

ip ssh time-out (number)


ip ssh authentication-retries (number)


Ssh.timeoutretries.jpg


SSH Through Putty

  • Step 1

You will login using the IP of the router you are connecting to.


Ssh.2.jpg


  • Step 2

Login using the user name and password created previously.


Go to enable mode and enter your password. You are now using secure SSH.


Ssh.3.jpg


External links