SSH & Local User Config 1

Topology

Tasks:

Physical cabling is in place, configure access control on the router.

  1. Create a local user on Router1 for authentication.
    • Username: corp
    • Password: support123
    • Privilege level: Exec mode
  2. Enable SSH v2 on Router1 using RSA 1024 bits modulus and domain-name test.com.
  3. Restrict access on VTY lines 0-15 to SSH only and secure it with local user authentication.
  4. Verify SSH access to Router1 from Router 2.

Solution:

Task 1: Create a local user on Router1 for authentication.

  • Username: corp
  • Password: support123
  • Privilege level: Exec mode

Router1#configure terminal
Router1(config)#username corp privilege 15 password support123

privilege 15 assigns full administrative (Exec mode) privileges to the user.

 

Task 2: Enable SSH v2 on Router1 using RSA 1024 bits modulus and domain-name test.com

Router1(config)#ip domain-name test.com
Router1(config)#crypto key generate rsa
How many bits in the modulus [512]: 1024
Router1(config)#ip ssh version 2

Explanation:

ip domain-name test.com sets the domain name. This is required for RSA key generation.

The command crypto key generate rsa generates RSA key pairs used for SSH encryption. After entering this command, you will be prompted to specify the modulus size of the RSA key in bits. Enter 1024, which is the required key size.

ip ssh version 2: Enables SSH v2 which is more secure that version 1.

 

Task 3: Restrict access on VTY lines 0-15 to SSH only and secure it with local user authentication.

VTY lines are used for remote access to the device. Restricting access to SSH only and securing with local user authentication means only authenticated users with the correct credentials can remotely access Router1.

Router1(config)#line vty 0 15
Router1(config-line)#transport input ssh
Router1(config-line)#login local
Router1(config-line)#exit

line vty 0 15 configures all VTY lines (0-15) for remote access.

login local configures the VTY lines to use the local user database for authentication.

transport input ssh restricts remote access to SSH only

 

Task 4: Verify SSH access to Router1 from Router2.

From the Router2, initiate a SSH session to Router1.

Router2#ssh -l corp 192.168.1.1

 

Password: support123

 

Router1#

 

Now exit configuration mode and save the configuration.

Router1(config)#end
Router1#write memory

 

Packet Tracer File

Clicking this button will begin the download of a ZIP file. Inside the ZIP file, you'll find a Packet Tracer Activity (.pka) file, which will automatically track your progress as you configure the network.