Configuring Secure Passwords and SSH
Yaser Rahmati | Instructor Version
Topology
Download Packet Tracer Completed File
Addressing Table
Scenario
The network administrator has asked you to prepare RTA for deployment. Before it can be connected to the network, security measures must be enabled.
Requirements
Configure the hostname as RTA.
Configure IP addressing on PCA according to the Addressing Table.
Console into RTA from the Terminal on PC-A.
Configure IP addressing on RTA and enable the interface.
Encrypt all plaintext passwords.
Set the domain name to yaser-rahmati.ir .
Create a user of your choosing with a strong password.
Generate 1024-bit RSA keys.
Block anyone for three minutes who fails to log in after four attempts within a two-minute period.
Configure the VTY lines for SSH access and use the local user profiles for authentication.
Save the configuration to NVRAM.
Set a strong secret password of your choosing.
Be prepared to demonstrate to your instructor that you have established SSH access from PCA to RTA.
Personal website: www.yaser-rahmati.ir
Last updated