Remote Admin Security

  1. limit active vty ports
  2. generate individual user/password (login local)
  3. limit active time
  4. disable TELLNET / Enable SSH
    1. Needs Hostname
    2. Needs Domain Name
    3. Generate Key
    4. SSH ver 2
    5. Use SSH Exclusively
  5. AAA server to centralize users
  6. ACL Access Lists

 

r2(config)# hostname r2

r2(config)# ip domain-name ccna.class

r2(config)# crypto key generate rsa

r2(config)# r2.ccna.class

r2(config)# line vty 0 1

r2(config-line)# transport input ssh

 

logging in

 

Putty

ssh -l name x.x.x.x

password:

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s