btalook.blogg.se

How to configure a cisco switch
How to configure a cisco switch










how to configure a cisco switch

Follow these steps to create a local user with username "jajish" and password as "OmniSecuPass" and with a privilege level 15.

how to configure a cisco switch

Step 1: First step in configuring SSH to securely access the CLI interface of a Cisco Router or Switch remotely is to create a local user database for user authentication. How to configure SSH (Secure Shell) in Cisco Router or Switch for secure remote access SSH uses TCP as its transport layer protocol and uses well-kown port number 22. Both SSH1 and SSH2 supports secure connection over network, but SSH2 supports for public key certificates and Diffie-Hellman key exchange.

how to configure a cisco switch

SSH has two main versions, SSH1 and SSH2. SSH supports Authentication to reliably determine the identity of the connecting computer, encryption to scramble data so that only the intended recipient only can read it and Integrity to guarantees the data sent over the network is not changed by a third party. SSH (Secure Shell) protocol provides the three main ideas of security authentication, confidentiality (via encryption) and integrity of data transfer over a network. SSH (Secure Shell) is a protocol which define how to connect securely over a network. Network administrators must disable telnet and use only SSH wherever possible. Telnet is used only as network testing tool like ping or netstat these days. SSH supports authentication, confidentiality and integrity for remote administration. SSH replaced telnet and SSH is much more secure than telnet. Telnet is an insecure protocol for remote server configuration. Telnet was the protocol which Network Administrators were using for accessing the CLI console of a server or a network device remotely.












How to configure a cisco switch