Preview

Lab Accessing Network Devices With SSHTopologyAddressing

Good Essays
Open Document
Open Document
2464 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab Accessing Network Devices With SSHTopologyAddressing
Lab - Accessing Network Devices with SSH
Topology

Addressing Table
Device

Interface

IP Address

Subnet Mask

Default Gateway

R1

G0/1

192.168.1.1

255.255.255.0

N/A

S1

VLAN 1

192.168.1.11

255.255.255.0

192.168.1.1

PC-A

NIC

192.168.1.3

255.255.255.0

192.168.1.1

Objectives
Part 1: Configure Basic Device Settings
Part 2: Configure the Router for SSH Access
Part 3: Examine a Telnet Session with Wireshark
Part 4: Examine a SSH Session with Wireshark
Part 5: Configure the Switch for SSH Access
Part 6: SSH from the CLI on the Switch

Background / Scenario
In the past, Telnet was the most common network protocol used to remotely configure network devices.
However, protocols such as Telnet do not authenticate or encrypt the information between the client and server. This allows a network sniffer to intercept passwords and configuration information.
Secure Shell (SSH) is a network protocol that establishes a secure terminal emulation connection to a router or other networking device. SSH encrypts all information that passes over the network link and provides authentication of the remote computer. SSH is rapidly replacing Telnet as the remote login tool of choice for network professionals. SSH is most often used to log in to a remote device and execute commands; however, it can also transfer files using the associated Secure FTP (SFTP) or Secure Copy (SCP) protocols.
For SSH to function, the network devices communicating must be configured to support it. In this lab, you will enable the SSH server on a router and then connect to that router using a PC with an SSH client installed. On a local network, the connection is normally made using Ethernet and IP.
In this lab, you will configure a router to accept SSH connectivity, and use Wireshark to capture and view
Telnet and SSH sessions. This will demonstrate the importance of encryption with SSH. You will also be challenged to configure a switch for SSH connectivity on your own.
Note: The routers used with CCNA

You May Also Find These Documents Helpful

  • Good Essays

    Attach a rollover cable to the PC’s COM port and then to either the Auxiliary or Console port on the router. Connect to the Console port because messages from the router are logged on this line. The Auxiliary port is used for remote access and can also be used if the Console port is damaged or not responding. The third way to access the CLI is through Telnet.…

    • 1170 Words
    • 5 Pages
    Good Essays
  • Good Essays

    • Authentication – the process for “trust” connection establishing between the server and the applier;…

    • 767 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT1430

    • 285 Words
    • 1 Page

    i. Both are text-based protocols: mouse movements cannot be transferred only keystrokes. Both are connection-oriented and are client-server protocols. The main difference is in security. SSH offers security mechanisms that protect the user against anyone with malicious intent while Telnet has no security measures whatsoever.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    ____ supports advanced authentication and encryption technologies; however, it requires Windows machines on both sides of any remote connection.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Brute Force - The intruder attempts to gain access to a server by guessing a user password (usually the root administrator) through the SSH server, Mail server, or other service running on your system. Brute force detection software will alert you when multiple failed attempts to gain access are in progress and disable access from the offending IP address.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Using weak passwords, Unencrypted data storage, passing clear text credentials over the network, using weak authentication mechanisms, allowing prolonged session lifetime…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    * Remote access must be secure and strictly controlled. Enforcement of control will be via password authentication or private/public keys with strong pass-phrases.…

    • 399 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    week 3 lab

    • 350 Words
    • 2 Pages

    3. Store passwords using reversible encryption is required for certain remote access protocols. It is also required to VPN in most cases.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    Having the computers and other network devices managed by authentication through a server will keep unauthorized devices from accessing the network, and ensure the overall integrity of the network as a whole.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Activity 1.7.1

    • 1271 Words
    • 6 Pages

    • • • • • • • Explore Packet Tracer Real-time mode Explore the Logical Workspace Explore Packet Tracer operation Connect devices Examine a device configuration Review the standard lab setup Overview of the devices…

    • 1271 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Explanation of Ssh

    • 835 Words
    • 4 Pages

    SSH (Secure Shell) is a protocol that can be used to log into a remote machine and provide secure encrypted communications between the Virtual Server and the local computer. The communication is made via encrypted channels. Telnet on the other hand communicates without any encryption, allowing a sniffer to capture information, e.g. user names and passwords. This is why SSH is preferred over Telnet.…

    • 835 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Ccna Lab Manual

    • 11287 Words
    • 46 Pages

    Parts 1a 1b 1c 1d 1e 1f 1g 1h 1g Basic Fundamentals of LAN Configure Basic Password and Hostname User Authentication Telnet Password Configure Banner SSH Configuration Switch Static IP address Configuration Verify the SSH Session Configure VLAN & assign interface Port Security Page NO 6 7 7 8 8 9 10 12 15…

    • 11287 Words
    • 46 Pages
    Satisfactory Essays
  • Good Essays

    Password Guessing Attack

    • 11810 Words
    • 48 Pages

    attacks on password-based systems are inevitable and commonly observed against web applications and SSH logins. In a recent report, SANS [20] identified password guessing attacks on websites as a top cyber security risk. As an example of SSH passwordguessing attacks, one experimental Linux honeypot setup has been reported [18] to suffer on average 2,805 SSH malicious login attempts per computer per day (see also [8]). Interestingly, SSH servers that…

    • 11810 Words
    • 48 Pages
    Good Essays
  • Satisfactory Essays

    Ccna Lab Configuration

    • 723 Words
    • 3 Pages

    Router>en // to enter from USER mode to Privilege mode use this command (en = enable)…

    • 723 Words
    • 3 Pages
    Satisfactory Essays

Related Topics