N2 Activity 1
N2 Activity 1
1
SECURITY
N E T WO R K I N G 2
Floyd D. de Vela
SECURITY
The objective of this activity if to familiarize you on how to use PACKET TRACER and set
security on your network using basics command line interface (CLI).
• Laptop/ Desktop
• Packet Tracer
Configuring a username and password on a managed switch is important for several reasons:
• Security: The most critical reason is security. By setting up authentication credentials, you prevent unauthorized
access to the switch's configuration and management functions. Without a username and password, anyone
with physical access to the switch could make changes to the network, potentially causing disruptions or
security breaches.
• Access Control: Usernames and passwords allow you to control who can access and configure the switch. You
can grant specific individuals or roles access while denying it to others. This ensures that only authorized
personnel can make changes to the network.
• Accountability: When each user has a unique username, their actions on the switch can be logged and
attributed to them. This is important for auditing and accountability purposes. If an issue arises, you can trace it
back to the responsible party.
• Compliance: In many organizations and industries, there are regulatory and compliance requirements that
mandate secure access control to network devices. Configuring usernames and passwords helps ensure
compliance with these regulations.
Configuring a username and password on a managed switch is important for several reasons:
Click CLI
Proceed to step 2
• You'll start in User EXEC mode, denoted by the > prompt. To configure the switch, you need to
access Privileged EXEC mode, denoted by the # prompt.
• Enter the following command:
• You'll be prompted for a password. If you haven't set an enable password yet, press Enter. If
you've already set one, enter it and press Enter.
• Replace [username] with the desired username and [password] with the desired password.
• This command configures the switch to use the local username and password database for VTY
login.
The purpose of secure line VTY access is to provide a safe and secure way to access the VTY lines on a router or switch.
VTY lines are virtual terminal lines that allow users to remotely connect to a router or switch using a terminal emulator.
Secure line VTY access can be implemented using a variety of methods, such as:
• Using SSH: SSH (Secure Shell) is a secure protocol that encrypts all traffic between the client and the server. This
prevents unauthorized users from eavesdropping on the traffic.
• Using authentication: Authentication can be used to verify the identity of the user who is trying to connect to the VTY
lines.This can be done using a username and password, or a certificate.
• Using ACLs: ACLs (Access Control Lists) can be used to restrict access to the VTY lines.This can be used to prevent
unauthorized users from connecting to the VTY lines.
Secure line VTY access is an important security measure that can help to protect your network from unauthorized access.
By implementing secure line VTY access, you can help to ensure that only authorized users can access the VTY lines on
your router or switch.