0% found this document useful (0 votes)
7 views20 pages

N2 Activity 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views20 pages

N2 Activity 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

ACTIVITY NO.

1
SECURITY
N E T WO R K I N G 2

Floyd D. de Vela
SECURITY

The objective of this activity if to familiarize you on how to use PACKET TRACER and set
security on your network using basics command line interface (CLI).

Floyd D. de Vela Networking 2


SECURITY

Items / tools needed

• Laptop/ Desktop
• Packet Tracer

Floyd D. de Vela Networking 2


SECURITY

Configuring a username and password on a managed switch is important for several reasons:

• Security: The most critical reason is security. By setting up authentication credentials, you prevent unauthorized
access to the switch's configuration and management functions. Without a username and password, anyone
with physical access to the switch could make changes to the network, potentially causing disruptions or
security breaches.
• Access Control: Usernames and passwords allow you to control who can access and configure the switch. You
can grant specific individuals or roles access while denying it to others. This ensures that only authorized
personnel can make changes to the network.
• Accountability: When each user has a unique username, their actions on the switch can be logged and
attributed to them. This is important for auditing and accountability purposes. If an issue arises, you can trace it
back to the responsible party.
• Compliance: In many organizations and industries, there are regulatory and compliance requirements that
mandate secure access control to network devices. Configuring usernames and passwords helps ensure
compliance with these regulations.

Floyd D. de Vela Networking 2


SECURITY

Configuring a username and password on a managed switch is important for several reasons:

• Preventing Unauthorized Configuration: Unauthorized configuration changes can lead to network


instability, downtime, or security vulnerabilities. By requiring authentication, you reduce the risk of
accidental or malicious configuration changes.
• Protection Against Physical Access: Even if a malicious actor gains physical access to the switch,
having a password in place adds an additional layer of protection. It's not enough to have physical
access; you also need the correct credentials to make changes.
• Secure Remote Access: If you configure Virtual Terminal Line (VTY) access with usernames and
passwords, you secure remote access to the switch via Telnet or SSH. This is crucial for network
management when you can't be physically present at the switch location.
• Data Privacy: If your switch handles sensitive data, securing it with a password ensures the privacy
of that data. Without proper authentication, data on the network could be exposed to unauthorized
users.

Floyd D. de Vela Networking 2


SECURITY

Step 1: Access the CLI of the Switch

• Open Cisco Packet Tracer and load your switch topology.


• Click on the switch to select it.
• In the "Physical" tab, click on the "CLI" button to access the Command Line Interface.

Floyd D. de Vela Networking 2


SECURITY

Open Cisco Packet Tracer and load your switch topology.

Floyd D. de Vela Networking 2


SECURITY

Open Cisco Packet Tracer and load your switch topology.

Floyd D. de Vela Networking 2


SECURITY

Click on the switch to select it.

Floyd D. de Vela Networking 2


SECURITY

Left click on the switch

Floyd D. de Vela Networking 2


SECURITY

Click CLI

Floyd D. de Vela Networking 2


SECURITY

Proceed to step 2

Floyd D. de Vela Networking 2


SECURITY

Step 2: Access Privileged EXEC Mode

• You'll start in User EXEC mode, denoted by the > prompt. To configure the switch, you need to
access Privileged EXEC mode, denoted by the # prompt.
• Enter the following command:

• You'll be prompted for a password. If you haven't set an enable password yet, press Enter. If
you've already set one, enter it and press Enter.

Floyd D. de Vela Networking 2


SECURITY

Step 3: Enter Global Configuration Mode


• Now, you need to enter Global Configuration mode to make configuration changes. Type the
following command:

Floyd D. de Vela Networking 2


SECURITY

Step 4: Create a Username and Password


• To create a username and password for console access, use the following command:

• Replace [username] with the desired username and [password] with the desired password.

Floyd D. de Vela Networking 2


SECURITY

Step 5: Secure Line VTY Access (Optional)


• If you want to secure Telnet or SSH access to the switch, you can configure username and
password for Virtual Terminal Lines (VTY). Here's how:

• This command configures the switch to use the local username and password database for VTY
login.

Floyd D. de Vela Networking 2


SECURITY

The purpose of secure line VTY access is to provide a safe and secure way to access the VTY lines on a router or switch.
VTY lines are virtual terminal lines that allow users to remotely connect to a router or switch using a terminal emulator.

Secure line VTY access can be implemented using a variety of methods, such as:

• Using SSH: SSH (Secure Shell) is a secure protocol that encrypts all traffic between the client and the server. This
prevents unauthorized users from eavesdropping on the traffic.
• Using authentication: Authentication can be used to verify the identity of the user who is trying to connect to the VTY
lines.This can be done using a username and password, or a certificate.
• Using ACLs: ACLs (Access Control Lists) can be used to restrict access to the VTY lines.This can be used to prevent
unauthorized users from connecting to the VTY lines.
Secure line VTY access is an important security measure that can help to protect your network from unauthorized access.
By implementing secure line VTY access, you can help to ensure that only authorized users can access the VTY lines on
your router or switch.

Floyd D. de Vela Networking 2


SECURITY

Step 6: Exit and Save the Configuration


• After creating the username and password, exit Global Configuration mode by typing:

• Save your configuration to ensure it persists after a reboot:

Floyd D. de Vela Networking 2


SECURITY

Step 7: Test the Login


• Close the CLI and attempt to access the switch via the console connection using the configured
username and password.

Floyd D. de Vela Networking 2


SECURITY

Floyd D. de Vela Networking 2

You might also like