0% found this document useful (0 votes)
23 views

Secure Shell (SSH) Configuration: Objective

This document provides a step-by-step guide to configure SSH on Cisco routers to encrypt network communication and enable secure remote access. It outlines setting up a router and PC with IP addresses on the same subnet, configuring the router hostname, generating an RSA key, creating a user, enabling SSH for 16 users, and verifying SSH connection from the PC to the router. The SSH configuration secures communication between devices and allows encrypted access to the router, providing more security than protocols like Telnet.

Uploaded by

Akshay Pujari
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Secure Shell (SSH) Configuration: Objective

This document provides a step-by-step guide to configure SSH on Cisco routers to encrypt network communication and enable secure remote access. It outlines setting up a router and PC with IP addresses on the same subnet, configuring the router hostname, generating an RSA key, creating a user, enabling SSH for 16 users, and verifying SSH connection from the PC to the router. The SSH configuration secures communication between devices and allows encrypted access to the router, providing more security than protocols like Telnet.

Uploaded by

Akshay Pujari
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

SECURE SHELL (SSH) CONFIGURATION

OBJECTIVE:

The objective of this documentation is to provide a step-by-step guide


for configuring SSH on Cisco routers. SSH (Secure Shell) is
implemented to enhance the security of network communication by
encrypting data and ensuring secure remote access.

ENVIRONMENT SETUP:

DEVICES:
1. Router: Cisco
2. PC: Workstation with SSH client capability

NETWORK TOPOLOGY:
1. Router's FastEthernet 0/0:
2. IP Address: 100.100.100.1
3. Subnet Mask: 255.255.255.252

PC:
1. IP Address: 100.100.100.2
2. Subnet Mask: 255.255.255.252
3. Gateway: 100.100.100.1
CONFIGURATION STEPS:
Router Initialization:
• Set the router's hostname:
Router(config)# hostname ABC
Domain Name and RSA Key Generation:

• Set the domain name and create an RSA key with a


modulus of 512 bits for encryption:
ABC(config)# ip domain-name SSHabc
ABC(config)# crypto key generate rsa general-keys
modulus 512
User Configuration:

• Create a user 'harsh' with a privilege level of 15 and


set the password 'abc123':
ABC(config)# username harsh privilege 15 password
abc123
SSH Configuration:

• Enable SSH for 16 users and specify SSH as the only


allowed input method.
• Allow local router users for SSH access.
• Set SSH version to 2 for enhanced security:
ABC(config)# line vty 0 15
ABC(config-line)# transport input ssh
ABC(config-line)# login local
ABC(config-line)# ip ssh version 2
Verification:

• Attempt an SSH connection from the PC to the router


using the command:
PC> ssh -l harsh 10.0.0.1

CONCLUSION:
The SSH configuration has been successfully applied, securing the
communication between devices. This setup ensures encrypted data
transfer and allows secure access to the router via SSH. It is
recommended to use SSH as the primary access method for enhanced
security compared to less secure protocols like Telnet.

You might also like