1. Experimental IntroductionAbout this experimentDuring network maintenance, network administrators usually need to log in to many devices. Logging in to each device through the console port is cumbersome and time-consuming. In addition, the data transmitted when Telnet remotely logs in to the device is plain text, which is not secure enough. To improve security, you can configure the SSH function on the device so that remote administrators can log in and manage the device securely through SSH. PurposeThrough this experiment, you can master the basic methods of configuring the SSH remote login function of the device. Experimental Network Introduction2. Experimental PlanningThe management PC uses a common network cable to connect to the GE1/0/0 port of the device, and the management PC uses PuTTY software to remotely log in to the device.
3. Experimental Task Configuration1. Configuration ideas2. Configuration stepsStep 1: Log in to the device through other methods, such as console login. Step 2: Enable SSH on the device Step 3: Configure the login interface. Configure the IP address of the interface for login After completing the above configuration commands, use display this to view the current configuration. As shown below: Configure the interface access control function. Configure interfaces to join security zones Configure security policies to allow the management PC to access G1/0/0 of the firewall. After completing the above configuration commands, use display this to view the current configuration. As shown below: Step 4: Configure administrator information Configure the VTY administrator authentication mode to AAA: Create an SSH administrator account sshuser, specify the authentication method as password, and configure the password as Admin@123, and the service method as SSH. Bind roles to administrators: Configure an SSH user. Step 5: Generate a local key pair. Step 6: Log in to your device Configure the address to 10.1.2.100/24 on the management PC, run PuTTY, fill in the device SSH parameters, and log in to the device. # Select Session, select SSH for Connectiontype protocol, fill in 10.1.2.1 for Host Name (or IP address), and configure the remaining parameters as shown in the figure. VerificationClick Open connection in step 6, press Enter, enter the username sshuser and the password Admin@123. When the following information appears on the PuTTY interface, it means that SSH login to the device is successful. |
<<: PnetLab storage is insufficient? Teach you how to expand it step by step
[[420026]] Recently, Mobile China learned that ev...
Docker provides a variety of network drivers, all...
At 2:30 pm on July 28, 2020, the Maker Beijing 20...
VRRP is a commonly used fault-tolerant protocol t...
Although information about 5G has attracted a lot...
The U.S. Department of Defense announced that it ...
Today, System Center Virtual Machine Manager (SCV...
The first application scenario of 5G is military ...
[Original article from 51CTO.com] In the blink of...
5G-enabled factories will have the ability to mai...
Webhosting24 is an Italian business founded in 20...
In March this year, the Ministry of Industry and ...
The world trend is surging forward. If we stop th...
So, how can enterprises fully realize the benefit...
The pandemic has exposed gaps in nearly every ind...