1.3.6 Packet Tracer Configure SSH
1.3.6 Packet Tracer Configure SSH
Addressing Table
Device Interface IP Address Subnet Mask
Objectives
Part 1: Secure Passwords
Part 2: Encrypt Communications
Part 3: Verify SSH Implementation
Background
SSH should replace Telnet for management connections. Telnet uses insecure plain text communications. SSH
provides security for remote connections by providing strong encryption of all transmitted data between devices. In
this activity, you will secure a remote switch with password encryption and SSH.
Instructions
b. Save the current configuration so that any mistakes you might make can be reversed by toggling the power for
S1.
c. Show the current configuration and note that the passwords are in plain text. Enter the command that encrypts
plain text passwords:
S1(config)# service password-encryption
d. Verify that the passwords are encrypted.
2013 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 2 www.netacad.com
Part 2: Encrypt Communications
Step 1: Set the IP domain name and generate secure keys.
It is generally not safe to use Telnet, because data is transferred in plain text. Therefore, use SSH whenever it is available.
a. Configure the domain name to be netacad.pka.
b. Secure keys are needed to encrypt the data. Generate the RSA keys using a 1024 key length.
Step 2: Create an SSH user and reconfigure the VTY lines for SSH-only access.
a. Create an administrator user with cisco as the secret password.
2013 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 2 www.netacad.com
2013 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 2 www.netacad.com
Packet Tracer - Configure SSH
b. Configure the VTY lines to check the local username database for login credentials and to only allow SSH for
remote access. Remove the existing vty line password.
2013 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 2 www.netacad.com