CLA – Assignment Quizzes – Answers (20).
Configure the VTY lines to check the local username database for login credentials and to only allow SSH for remote access.S1(config)# username administrator secret cisco Create an administrator user with cisco as the secret password.Step 2: Create an SSH user and reconfigure the VTY lines for SSH-only access. % Generating 1024 bit RSA keys, keys will be non-exportable… Choosing a key modulus greater than 512 may take The name for the keys will be: S1.netacad.pkaĬhoose the size of the key modulus in the range of 360 to 2048 for your Generate the RSA keys using a 1024 key length. Secure keys are needed to encrypt the data.Configure the domain name to be netacad.pka.Therefore, use SSH whenever it is available. It is generally not safe to use Telnet, because data is transferred in plain text. Part 2: Encrypt Communications Step 1: Set the IP domain name and generate secure keys. Verify that the passwords are encrypted.Enter the command that encrypts plain text passwords: Show the current configuration and note that the passwords are in plain text.Save the current configuration so that any mistakes you might make can be reversed by toggling the power for S1.
The user EXEC and privileged EXEC password is cisco. Using the command prompt on PC1, Telnet to S1.In this activity, you will secure a remote switch with password encryption and SSH. SSH provides security for remote connections by providing strong encryption of all transmitted data between devices. Telnet uses insecure plain text communications. SSH should replace Telnet for management connections. Part 3: Verify SSH Implementation Background Last Updated on Februby Admin 8.5.3.5 Packet Tracer – Configuring SSH Answers Packet Tracer – Configuring SSH ( Answers Version)Īnswers Note: Red font color or gray highlights indicate text that appears in the Answers copy only.