Cisco routers use many methods in configuration. Using SSH instead of Telnet cisco makes it easier for us to understand the configuration of cisco routers and other knowledge points.
Replacing Telnet with cisco router configuratio
1. Preface
A large number of Cisco routers are used in Jiangxi IP networks. Administrators usually use Telnet to remotely log on to the vro for routine maintenance. Because Telnet, FTP, and other network service programs use plain text transmission passwords and data in the network, their security cannot be effectively guaranteed. Once the Administrator's user name and password are intercepted by someone with ulterior motives, the consequences will b
supports SSH. log on to your vro or vswitch and check whether you have loaded an IPSec IOS image that supports SSH.
In our example, we will use the Cisco IOS command. Run the following command:
Router> Show flash
This command displays the name of the loaded IOS image. You can use the result to compare the list of supp
1. TELNET Remote logon Configuration
1. Configure the Logon account, password, and account level on the CISCO router, as shown below. The account name is abc, the password is abc123, And the account level is 15 to the highest level)
R1 # configure terminal
R1 (config) # username abc privilege 15 secret abc123
R1 (config) # end
R1 #
2. Configure the remote logon authentication mechanism for the
whether you have loaded an IPSec IOS image that supports SSH.
In our example, we will use the Cisco IOS command. Run the following command:Router> Show flashThis command displays the name of the loaded IOS image. You can use the result to compare the list of supported features of your supplier.After you verify that your device supports SSH, make sure that the de
The user checks network security and requires SSH logon to the core device. Previously, the device used Telnet logon, and the user name and password are transmitted in plaintext, which does not meet the security check requirements.
In fact, the SSH login configuration is very simple, mainly divided into the following steps:
1. Configure the Domain Name
Sd_core_r7600 (config) # IP domain-name sdcore
2. gener
When we use Telnet to log on to the device, the user name and password are transmitted in clear text, in order to ensure the security of the data, we recommend the use of SSH login device. The following is the configuration of the Cisco router SSH:1. Configuring hostname and Domain-nameR1 (config) #hostname R1R1 (confi
Simple Local authentication:(config) #username admin password Cisco // Establish user admin password for Cisco Local User (default permission level is 1)(config) #line vty 0 4 (config-line) #login local / /call on- premises authentication / / above method configuration, the default entry is User mode ">" After Telnet, An en password is required to enter the "#" password
With the development of China's routing industry, its market demand is also increasing. As a leader in the routing industry, Cisco routers have a very high market share. Telnet to the Cisco router for remote management is the choice of many network management, but the data transmitted through Telnet is in plain text, so this login method has a great security risk
sessions the router or switch has actively openedShow user//view this router or switch who has telnet in, can display his IP addressDisconnect//Active disconnection of the Telnet session opened by this router on this routerClear Line//clears the remote connection, discovers a Telnet session, clears himCtrl+shift+6 x//telnet Session switchingResume + Session ID//
(config) # line console 0Router (config-line) # password SecR3t! PassRouter (config-line) # login
Auxiliary Port
The secondary port is a physical access port of the router. Not all Cisco routers have this port. The Auxiliary port can be used to enter the backup configuration port on the console. Therefore, it is also very important to set a password. The following is how to set the command:
A malicious user may use a Sniffer tool like Sniffer to perform local monitoring on the Administrator host or an appropriate interface to obtain the Administrator's password for logging on to the Cisoc router. So how can we use SSH to enhance the remote management of Cisco routers?
1. Security Testing
I installed sniffer locally and used Telnet to log on to the
There are many users of Cisco routers. Here we mainly introduce how to keep Cisco routers away from DoS attacks. DoS Dictionary Attacks against routers allow attackers to gain access to Cisco routers or prevent users from using the routers. In this article, you can find out how to use the enhanced login function of the Cisco
Cisco routers play a very important role in the routing industry, and there are also a lot of user groups. It is very important to understand some Cisco router security configurations. Currently, most enterprises and departments connect to the Internet. Generally, a router is connected to an ISP.
This
access a vro, further configuration is required to restrict further access to the vro.
Most Cisco routers are still controlled through remote logon and do not adopt any encryption method. Communication Using Remote logon is transmitted in plain text, which easily exposes the logon password. Although CiscoIOS12.1 adopts the SSHl encryption method, there are still many problems. Before Cisco considers using
services such as BIND, IMAP, POP, and sendmail, which are frequently problematic in UNIX systems. Although there are few ways to access a vro, further configuration is required to restrict further access to the vro.
Most Cisco routers are still controlled through remote logon and do not adopt any encryption method. Communication Using Remote logon is transmitted in plain text, which easily exposes the logon password. Although CiscoIOS12.1 adopts the
Telnet to the Cisco router for remote management is the choice of many network management, but the data transmitted through Telnet is in plain text, so this login method has a great security risk. A malicious user may use a Sniffer tool like Sniffer to perform local monitoring on the Administrator host or an appropriate interface to obtain the Administrator's password for logging on to the Cisoc
there are few ways to access a vro, further configuration is required to restrict further access to the vro.
Most Cisco routers are still controlled through remote logon and do not adopt any encryption method. Communication Using Remote logon is transmitted in plain text, which easily exposes the logon password. Although CiscoIOS12.1 adopts the SSHl encryption method, there are still many problems. Before Cisco
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.