0% found this document useful (0 votes)
4 views

2019 Packet Tracer - Part 02

The document outlines the process of configuring remote access to devices using Telnet and SSH in Cisco Packet Tracer. It details steps for creating a simple topology, assigning IP addresses, configuring switches, and enabling secure access. Additionally, it mentions upcoming topics on DHCP and DNS servers as part of the learning objectives.

Uploaded by

wabedin470
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

2019 Packet Tracer - Part 02

The document outlines the process of configuring remote access to devices using Telnet and SSH in Cisco Packet Tracer. It details steps for creating a simple topology, assigning IP addresses, configuring switches, and enabling secure access. Additionally, it mentions upcoming topics on DHCP and DNS servers as part of the learning objectives.

Uploaded by

wabedin470
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

CISCO PACKET TRACER

PART TWO
Gordon Johnson

g.johnson@kingston.ac.uk
Telnet and SSH

▪ Use Telnet to access remotely another device.


▪ Use Secure Shell version 2 protocol which allows encrypted remote access.
Create a Simple Topology

Create the simple topology using Cisco Packet Tracer and assign a static IP address to
each PC, following the addressing scheme used in the figure below.
Assigning IP Address to End Device

1. Select Device
2. Click the Desktop tab
3. Enter desired IP Address
Initial Switch Configuration

▪ Provide the switch with a hostname


▪ Set the console password using
“console” as password.
▪ Set the telnet password for 0 to 15 lines
using “telnet” as password.
▪ Save all configurations to the startup
configuration of the switch
Switch IP Address

▪ Switches are Layer 2 devices, hence they do not have an IP address by default that
we may use to telnet or SSH to.
▪ To solve this, we can use one of the VLANs that exists on the switch, and create a
virtual interface called an SVI, or Switched Virtual Interface.
▪ Use the “show ip interface brief” (or “sh ip int br”) command to get a quick snapshot
of all the interfaces in the switch
Allocate a VLAN with an IP Address

▪ Try to assign an IP address to that


logical interface (preferably in the same
subnet range as other devices in that
same VLAN).
▪ Save your configurations to the start-up
configuration of the switch.
▪ The “no shutdown” command is used to
open the interface, which is by default
turned off.
Enable Password or Secret

▪ As we will be accessing the switch


externally via Telnet we need to protect
Privileged mode.
▪ To protect the higher modes use the
enable password or enable secret
commands within the Global
Configuration Mode.
▪ Both these commands accomplish the
same thing, but;

▪ enable secret encrypts the stored password.


▪ enable password stores as plain text.
Ping and Telnet

Telnet is an emulation program that allows


us to go into a device using Port 23.

▪ Go to PC1,
1. Select the Desktop tab
2. Open Command Prompt (Not the Terminal)
3. Ping the switch using the address you
assigned to the SVI.

▪ Once ping is successful, try to telnet the


switch using the following command
“telnet <IP_ADDRESS>”
Secure Shell (SSH)

SSH is a protocol which provides the same functionality with telnet, only that it does
so with a secure manner by using traffic encryption.
To enable SSH we have to do the following configurations:
▪ Hostname
▪ Domain Name (for encryption purposes)
▪ Secure Key (it generates the keys based on the domain name and the hostname)
▪ Enabling SSH v2
▪ Create users
▪ Allow SSH
Setting Domain and Creating RSA Key

The hostname has already been


configured from previous stage.
So the next step is to enable
the domain name after which
we can generate the secure key
in the switch.
You can choose how many bits
you would like key modulus to
be. (360 - 2048) default: 512
For SSH 768 or higher
Follow the commands:
Enable SSH, Create User and Allow SSH

First we enable SSH as well as


defining version 2
Next create a Username and
Password.
Then we overwrite the telnet
line, by defining the transport
protocol as SSH

Don’t forget to save your


running configuration!
Save the Changes to Memory

▪ When you make changes on a Cisco IOS device, you alter the configuration held in
active memory (RAM).
▪ Similar to computers when the device is shut down everything in RAM gets lost.
▪ This is the reason for the two configuration files referred to earlier, the running-
configuration (running in RAM), and startup-configuration (stored in more permanent
memory, called non-volatile RAM or NVRAM).
▪ In order to save the changes that you make to the running-configuration, you need
to copy it to the startup-configuration using the command “copy run start” from the
privilege mode.
Connecting via SSH from an End Device

Open up an end device PC and


navigate to the command prompt.
Create an SSH connection using:
ssh –l <USERNAME> <TARGET_IP>
You will then be asked to enter you
password associated with the
username.
Next Week - DHCP & DNS Servers

▪ Automatically assign IP Addresses from a DHCP Router


▪ Setup a DNS Server
▪ Setup a DHCP Server
Homework - Create a Simple Topology

Create the simple topology using Cisco Packet Tracer, following the scheme used in
the figure below. Note: the activity lights between the switch and the router will remain
RED for the time being.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy