Lab 2.5.2a Configure SSH
|
|
|
- Eugene Lawrence
- 9 years ago
- Views:
Transcription
1 Lab 2.5.2a Configure SSH Objective Scenario Topology In this lab, the students will complete the following tasks: Configuring a router as a Secure Shell (SSH) server Version 1. Install and configure a SSH client on the Student PC. Using show and debug commands to troubleshoot SSH Strengthen SSH by configuring SSHv2. An IT administrator is concerned about using Telnet for remote administration. Therefore, the security policy has been updated and now requires the use of encrypted sessions for remote management sessions. The IT administrator must now configure SSH on the perimeter router. This figure illustrates the lab network environment. Preparation Begin with the standard lab topology and verify the starting configuration on the pod router. Test the connectivity between the pod routers. Access the perimeter router console port using the terminal 1-8 Network Security 1 v2.0 Lab 2.5.2a Copyright 2005, Cisco Systems, Inc.
2 emulator on the student PC. If desired, save the router configuration to a text file for later analysis. Refer back to the Student Lab Orientation if more help is needed. Prior to starting the lab, ensure that each host PC is loaded with a SSH client. There are numerous SSH clients available for free on the Internet. The lab was developed using the PuTTY SSH client. Tools and resources: In order to complete the lab, the following is required: Standard IOS Firewall lab topology Console cable HyperTerminal SSH client Further information about the objectives covered in this lab can be found at the following websites: Command list apter09186a00800ca7d5.html In this lab exercise, the following commands will be used. Refer to this list if assistance or help is needed during the lab exercise. Command crypto key generate rsa hostname ip domain-name ip ssh transport input Description Generates Rivest, Shamir, and Adleman (RSA) key pairs. This command changes the hostname of the router. Defines a default domain name that the Cisco IOS software uses to complete unqualified host names. Use the ip ssh command to configure Secure Shell (SSH) control parameters on the router. Use the version option to specify the SSH version. Defines which protocols to use to connect to a specific line of the router. Step 1 Configuring SSH on a Router To enable SSH on the router, the following parameters should be configured: Hostname Domain-name Asymmetrical keys SSH timeouts Local authentication Version a. Set router parameters Begin by configuring the router hostname and domain-name using the following commands: 2-8 Network Security 1 v2.0 Lab 2.5.2a Copyright 2005, Cisco Systems, Inc.
3 To configure the router hostname, use the hostname hostname command in configuration mode. In this lab, the hostname has been configured to RouterP, where P is the pod number. For example, if the team has been assigned to Pod 5 then the hostname would be Router5. RouterP(config)#hostname RouterP After the hostname is set, the active CLI will dynamically change. To configure the router IP domain-name, use the ip domain-name domain name command in Configuration Mode. RouterP(config)#ip domain-name cisco.com What command can be used to view both the hostname and IP domain name? Use the ip ssh version 1 command to configure the router to use SSH version 1. Step 2 Generate Asymmetric Keys a. Generate RSA keys Enter the following command in the configuration mode: RouterP(config)#crypto key generate rsa? What are the available help options for this command? b. Generate RSA keys (continued) To enable SSH for local and remote authentication on the router enter the command crypto key generate rsa and press Enter. The router will respond with a message showing the naming convention for the keys. What is the default size, in bits, of the key modulus? Press Enter to accept the default key size and continue. Step 3 Configure SSH Timeouts a. Configuring SSH timeouts and authentication retries is a way of providing additional security for the connection. Use the command ip ssh {[time-out seconds]} {authentication-retries integer} to enable timeouts and authentication retries. Set the SSH timeout to 15 seconds and the amount of retries to 2 by entering the following commands: RouterP(config)#ip ssh time-out 15 RouterP(config)#ip ssh authentication-retries 2 1. What is the maximum timeout value allowed? What is the maximum amount of authentication retries allowed? Step 4 Configure Local Authentication and vty a. Use the following commands to define a local user and assign SSH communication to the vty lines: 3-8 Network Security 1 v2.0 Lab 2.5.2a Copyright 2005, Cisco Systems, Inc.
4 RouterP(config)# username student password cisco RouterP(config)# line vty 0 4 RouterP(config-line)# transport input ssh RouterP(config-line)# login local 1. What are the available parameters for the transport input command? 2. Why would you limit this only to SSH? Step 5 Communicating Between a SSH PC (Client) to Router (Server) The basic settings to allow a PC and a router to establish a SSH session are now configured. In order to establish a SSH session, launch the SSH client from the student PC. a. The configurations will vary between the different SSH clients. If PuTTY is being used as the SSH client, following these instructions. Launch the PuTTY.exe file and a pane with various configuration options will open. b. In the Host Name (or IP address) input box enter the IP address of the pod router. Next, make sure that radio button next to SSH is selected under Protocol:. These two values must be sent to establish the SSH connection. To test the connection, press the Open command button at the bottom of the window. c. The SSH client will prompt for the local username and password that was previously set on the Pod router. Enter the student for the username and cisco for the password. 4-8 Network Security 1 v2.0 Lab 2.5.2a Copyright 2005, Cisco Systems, Inc.
5 1. Was the SSH connection successful? If so, how is the prompt displayed? Step 6 Debug and Verify SSH a. Enable debugging i. Enable debugging of SSH by entering the following commands: RouterP(config)#logging on RouterP(config)#logging console RouterP#debug ip ssh b. SSH debug output i. Next, open another instance of the SSH client and connect to the router. Use the correct username and password to log in to the router. The debug output should be similar to the output below. 03:45:37: SSH1: starting SSH control process 03:45:37: SSH1: sent protocol version id SSH-1.5-Cisco :45:37: SSH1: protocol version id is - SSH-1.5-PuTTY-Release-0.53b 03:45:37: SSH1: SSH_SMSG_PUBLIC_KEY msg 03:45:38: SSH1: SSH_CMSG_SESSION_KEY msg - length 112, type 0x03 03:45:38: SSH: RSA decrypt started 03:45:39: SSH: RSA decrypt finished 03:45:39: SSH: RSA decrypt started 03:45:39: SSH: RSA decrypt finished 03:45:39: SSH1: sending encryption confirmation 03:45:39: SSH1: keys exchanged and encryption on 03:45:41: SSH1: SSH_CMSG_USER message received 03:45:41: SSH1: authentication request for userid student 5-8 Network Security 1 v2.0 Lab 2.5.2a Copyright 2005, Cisco Systems, Inc.
6 ii. 03:45:41: SSH1: SSH_SMSG_FAILURE message sent 03:45:44: SSH1: SSH_CMSG_AUTH_PASSWORD message received 03:45:44: SSH1: authentication successful for student 03:45:44: SSH1: requesting TTY 03:45:44: SSH1: setting TTY - requested: length 24, width 80; set: length 24, width 80 03:45:44: SSH1: SSH_CMSG_EXEC_SHELL message received 03:45:44: SSH1: starting shell for vty03:45:37: SSH1: starting SSH control process To get an idea of the debugging process and the debugging message, open another instance of the SSH client and intentionally enter the wrong username or password. View the debugging output for failed authentication. When you are done viewing the debugging output, use the no debug ip ssh command to stop debugging. c. Viewing SSH sessions i. Use the show ssh command to view the active SSH sessions. ii. Fill in the appropriate values of the table below, based on the output of the show ssh command. Connection Version Encryption State Username 1. Is the SSHv2 server running? d. Viewing SSH parameters i. To display the version information and SSH parameters, use the show ip ssh command. 1. Is the output displayed exactly as the output below? If not, what are the differences? RouterP#show ip ssh SSH Enabled - version 1.5 Authentication timeout: 15 secs; Authentication retries: 3 e. End the SSH connection. From the router console, terminate the SSHv1 session. RouterP#disconnect ssh 0 0 is the connection # which can be found in the output from the show ssh command. 6-8 Network Security 1 v2.0 Lab 2.5.2a Copyright 2005, Cisco Systems, Inc.
7 Step 7 Configure SSH Version 2 a. SSH version 1 is more secure than telnet, however there are some cryptopgraphic weaknesses to SSHv1. Many devices now support SSHv2. Configuring SSHv2 is a way of providing additional security for the connection. Use the command ip ssh version to enable SSHv2. Note: If the IOS version in use does not support SSHv2, proceed to Step 7 to communicate between two routers using SSHv1. RouterP(config)#ip ssh version 2 RouterP(config)#exit RouterP# b. Next, open another instance of the SSH client and connect to the router. Use the correct username and password to log in to the router. Use the show ssh command to view the active SSH sessions. Fill in the appropriate values of the table below, based on the output of the show ssh command. Connection Version Encryption Hmac State Username 1. Is the SSHv2 server running? c. End the SSH connection. From the router console, terminate the SSHv1 session. RouterP#disconnect ssh 0 0 is the connection # which can be found in the output from the show ssh command. Step 8 Router to Router SSH Connection a. Confirm peer SSH configurations i. Verbally communicate with the peer team to ensure the peer router Q has been configured to accept a SSH connection. Also, confirm the version of SSH. The settings configured in Steps 1 through 7 will be applicable to enable a SSH connection between two routers. Only this time, instead of using a SSH client running on a host computer, the router will be the SSH client and will establish a connection to the peer router. By default, the Cisco IOS will act as both a SSH server and SSH client. b. Testing Telnet i. When the peer group is ready, enter the telnet command and establish connectivity with the peer router. RouterP#telnet Q.2 (where Q is the peer team router) 1. Was the Telnet connection successful? Why or why not? 7-8 Network Security 1 v2.0 Lab 2.5.2a Copyright 2005, Cisco Systems, Inc.
8 c. SSH parameters i. Enter the following commands to establish a SSH connection to the peer router: RouterP(config)#ssh? 1. What are the additional arguments of the ssh command? 2. What encryption algorithms are available? d. Router to router SSH connection i. Enter the following command to establish a SSH connection to the peer router: RouterP>ssh c aes128-cbc l student Q.2 This command makes a SSH connection to a peer router with an address of Q.2, 128 bit AES as the encryption, and student as the login username. The password is cisco. 1. Was the SSH connection successful? e. Verify SSH i. Enter the following command to verify the SSH connection: RouterP#show ip ssh RouterP#show ssh 1. What other commands could be useful to verify and troubleshoot SSH connections? 8-8 Network Security 1 v2.0 Lab 2.5.2a Copyright 2005, Cisco Systems, Inc.
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
Configuring Secure Shell on Routers and Switches Running Cisco IOS
Configuring Secure Shell on Routers and Switches Running Cisco IOS Document ID: 4145 Contents Introduction Prerequisites Requirements Components Used Conventions SSH v1 vs. SSH v2 Network Diagram Test
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1
Lab 8.3.3b Configuring a Remote Router Using SSH
Lab 8.3.3b Configuring a Remote Router Using SSH Objectives Use SDM to configure a router to accept SSH connections. Configure SSH client software on a PC. Establish a connection to a Cisco ISR using SSH
Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM
Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Objective Scenario Topology In this lab, the students will complete the following tasks: Prepare to configure Virtual Private Network (VPN)
Cisco Configuring Secure Shell (SSH) on Cisco IOS Router
Cisco Configuring Secure Shell (SSH) on Cisco IOS Router Table of Contents Configuring Secure Shell (SSH) on Cisco IOS Routers...1 Contents...1 Introduction...1 Hardware and Software Versions...1 SSHv1
Lab 6.2.12a Configure Remote Access Using Cisco Easy VPN
Lab 6.2.12a Configure Remote Access Using Cisco Easy VPN Objective Scenario Topology In this lab, the students will complete the following tasks: Enable policy lookup via authentication, authorization,
Lab 5.2.5 Configure IOS Firewall IDS
Lab 5.2.5 Configure IOS Firewall IDS Objective Scenario Topology: Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, the student will learn how to perform
CCNA Security. Chapter Two Securing Network Devices. 2009 Cisco Learning Institute.
CCNA Security Chapter Two Securing Network Devices 1 The Edge Router What is the edge router? - The last router between the internal network and an untrusted network such as the Internet - Functions as
Lab 8.3.13 Configure Cisco IOS Firewall CBAC
Lab 8.3.13 Configure Cisco IOS Firewall CBAC Objective Scenario Topology In this lab, the students will complete the following tasks: Configure a simple firewall including CBAC using the Security Device
Lab 7.3.6 Configure Remote Access Using Cisco Easy VPN
Lab 7.3.6 Configure Remote Access Using Cisco Easy VPN Objective Scenario Estimated Time: 20 minutes Number of Team Members: Two teams with four students per team In this lab, the student will learn the
Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server
Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server Objective Scenario Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, students will learn the
Configuring the Cisco Secure PIX Firewall with a Single Intern
Configuring the Cisco Secure PIX Firewall with a Single Intern Table of Contents Configuring the Cisco Secure PIX Firewall with a Single Internal Network...1 Interactive: This document offers customized
Implementing Secure Shell
Secure Shell (SSH) is an application and a protocol that provides a secure replacement to the Berkeley r-tools. The protocol secures sessions using standard cryptographic mechanisms, and the application
Lab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance
Lab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance Objective Scenario Estimated Time: 20 minutes Number of Team Members: Two teams with four students per team
Secure Shell (SSH) FAQ
Secure Shell (SSH) FAQ Document ID: 19143 Contents Introduction How do I configure SSH terminal line access (also known as reverse telnet)? Is SSH supported on the Catalyst 2900? How can I determine which
Lab 3.8.3 Configure Cisco IOS Firewall CBAC on a Cisco Router
Lab 3.8.3 Configure Cisco IOS Firewall CBAC on a Cisco Router Objective Scenario Topology Estimated Time: 35 minutes Number of Team Members: Two teams with four students per team In this lab exercise,
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
Configuring CSS Remote Access Methods
CHAPTER 11 Configuring CSS Remote Access Methods This chapter describes how to configure the Secure Shell Daemon (SSH), Remote Authentication Dial-In User Service (RADIUS), and the Terminal Access Controller
Lab 3.1.2 Creating a Logical Network Diagram
Lab 3.1.2 Creating a Logical Network Diagram Objectives Use router and switch commands to obtain information about an existing network. Use Cisco Network Assistant to obtain information about an existing
BRI to PRI Connection Using Data Over Voice
BRI to PRI Connection Using Data Over Voice Document ID: 14962 Contents Introduction Prerequisites Requirements Conventions Background Information Configure Network Diagram Configurations Verify Troubleshoot
Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example
Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example Document ID: 45843 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Passwords
Lab 6.1.3 Configure Local AAA on Cisco Router
Lab 6.1.3 Configure Local AAA on Cisco Router Objective Scenario Topology In this lab, the students will complete the following tasks: Securing and testing access to the privileged EXEC, VTY, and console
Table of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access
Table of Contents Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Configure...2
Using Device Discovery
2 CHAPTER You can use Active Discovery to scan your network for new monitors (Active Monitors and Performance Monitors) and devices on a regular basis. Newly discovered items are added to the Active Discovery
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
Lab 11.5.6.1 Configure Syslog on AP
Lab 11.5.6.1 Configure Syslog on AP Estimated Time: 25 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, students will configure and use syslog logging to monitor
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
- The PIX OS Command-Line Interface -
1 PIX OS Versions - The PIX OS Command-Line Interface - The operating system for Cisco PIX/ASA firewalls is known as the PIX OS. Because the PIX product line was acquired and not originally developed by
Lab 2.3.3 Configure Intrusion Prevention on the PIX Security Appliance
Lab 2.3.3 Configure Intrusion Prevention on the PIX Security Appliance Objective Scenario Topology In this lab exercise, the students will complete the following tasks: Configure the use of Cisco Intrusion
Cisco Configuration Professional Quick Start Guide
Cisco Configuration Professional Quick Start Guide April 29, 2011 This document explains how to start using Cisco Configuration Professional Express (Cisco CP Express) and Cisco Configuration Professional
Enhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S 121(8a)E 122(14)S This feature was introduced Support for this feature was integrated into Cisco IOS Release 121(8a)E This feature was integrated
Configuring TACACS+, RADIUS, and Kerberos on Cisco Catalyst Switches
Configuring TACACS+, RADIUS, and Kerberos on Cisco alyst Switches Document ID: 13847 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Configuration Steps
Configuring SSH and Telnet
This chapter describes how to configure Secure Shell Protocol (SSH) and Telnet on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About
Lab 8.4.5.1 Configuring LEAP/EAP using Local RADIUS Authentication
Lab 8.4.5.1 Configuring LEAP/EAP using Local RADIUS Authentication Objective Topology Estimated Time: 40 minutes Number of Team Members: Students can work in teams of two. In this lab, the student will
Lab 4.1.4 Creating a Network Map using CDP Instructor Version 2500
Lab 4.1.4 Creating a Network Map using CDP Instructor Version 2500 Objective Use Cisco Discovery Protocol (CDP) commands to get information about neighboring network devices. Background/Preparation CDP
Enhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S This feature was introduced This document describes the Enhanced Password Security feature in It includes the following sections: Feature Overview,
crypto key generate rsa
, page 2 1 To generate Rivest, Shamir, and Adelman (RSA) key pairs, use the commandinglobal configuration mode. [general-keys usage-keys signature encryption] [label key-label] [exportable] [modulus modulus-size]
Job Aid: Creating Additional Remote Access Logins
This job aid describes the steps required to add an additional remote access login to the Avaya S8300, S8500, and S8700 Series Media Servers. These logins may be used to establish a Point to Point Protocol
Lab 4.2.4 Advanced Telnet Operations
Lab 4.2.4 Advanced Telnet Operations Objective Use the telnet command to remotely access other routers. Verify that the application layer between the source and the destination is working properly. Suspend
Lab 6.5.9b Configure a Secure VPN Using IPSec between a PIX and a VPN Client using CLI
Lab 6.5.9b Configure a Secure VPN Using IPSec between a PIX and a VPN Client using CLI Objective Scenario Topology In this lab exercise, the students will complete the following tasks: Configure and Verify
Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5
Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5 Objectives Part 1: Configure CCP Access for Routers Enable HTTP/HTTPS server. Create a user account with privilege level 15.
ICND1-100-101 IOS CLI Study Guide (CCENT)
ICND1-100-101 IOS CLI Study Guide (CCENT) Hostname: 2. hostname SW1 SWITCH CONFIGURATION Mgmt IP: 2. interface vlan 1 3. ip address 10.0.0.2 4. no shut Gateway: 2. ip default-gateway 10.0.0.1 Local User/Pwd:
How to Tunnel Remote Desktop Through SSH on a Windows Computer
College of Engineering > Computing Resources > Computing Best Practices > W indows Remote Desktop How to Tunnel Remote Desktop Through SSH on a Windows Computer Why me and why now? CAE has been charged
Using LiveAction with Cisco Secure ACS (TACACS+ Server)
LiveAction Application Note Using LiveAction with Cisco Secure ACS (TACACS+ Server) September 2012 http://www.actionpacked.com Table of Contents 1. Introduction... 1 2. Cisco Router Configuration... 2
Configuring Basic Settings
CHAPTER 12 This chapter describes how to configure basic settings on your ASASM that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the
Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1)
University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1) Lab GSA: Carlos Caicedo Page I. Lab resources
Lab 5.3.7 Configuring DHCP with SDM and the Cisco IOS CLI
Lab 5.3.7 Configuring DHCP with SDM and the Cisco IOS CLI Device Host Name Interface IP Address Subnet Mask R1 Customer Serial 0/0/1 (DTE) 209.165.200.225 255.255.255.224 Fast Ethernet 0/0 192.168.1.1
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
Configuring a Leased Line
CHAPTER 4 Configuring a Leased Line The configuration in this chapter describes how to configure a Cisco 1700 router for IP and IPX over a synchronous serial line. Before You Begin The configuration in
LAN-Cell to Cisco Tunneling
LAN-Cell to Cisco Tunneling Page 1 of 13 LAN-Cell to Cisco Tunneling This Tech Note guides you through setting up a VPN connection between a LAN-Cell and a Cisco router. As the figure below shows, the
Lab 5.3.8 Configuring PAT with SDM and Static NAT using Cisco IOS Commands
Lab 5.3.8 Configuring PAT with SDM and Static NAT using Cisco IOS Commands Device Host Name Interface IP Address Subnet Mask R1 CustomerRouter Serial 0/0/0 (DTE) 209.165.200.225 255.255.255.224 Fast Ethernet
Lab 5.3.9b Managing Router Configuration Files Using TFTP
Lab 5.3.9b Managing Router Configuration Files Using TFTP Device Host Name Interface IP Address Subnet Mask R1 R1 Fast Ethernet 0/0 172.17.0.1 255.255.0.0 Objectives Download and install TFTP server software.
Tunnels and Redirectors
Tunnels and Redirectors TUNNELS AND REDIRECTORS...1 Overview... 1 Security Details... 2 Permissions... 2 Starting a Tunnel... 3 Starting a Redirector... 5 HTTP Connect... 8 HTTPS Connect... 10 LabVNC...
HTTP 1.1 Web Server and Client
HTTP 1.1 Web Server and Client Finding Feature Information HTTP 1.1 Web Server and Client Last Updated: August 17, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users
Encrypted Preshared Key
Encrypted Preshared Key The Encrypted Preshared Key feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Encrypted Preshared Key Release
Scenario: Remote-Access VPN Configuration
CHAPTER 7 Scenario: Remote-Access VPN Configuration A remote-access Virtual Private Network (VPN) enables you to provide secure access to off-site users. ASDM enables you to configure the adaptive security
OpenVPN over SSH tunneling
Step 1: What you'll need before starting OpenVPN over SSH tunneling You're going to need a couple of things in order to create an SSH tunnel that you can use as a SOCKS 5 proxy for tunneling OpenVPN or
McAfee Firewall Enterprise 8.2.1
Configuration Guide FIPS 140 2 Revision A McAfee Firewall Enterprise 8.2.1 The McAfee Firewall Enterprise FIPS 140 2 Configuration Guide, version 8.2.1, provides instructions for setting up McAfee Firewall
HP Device Manager 4.7
Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...
isco Connecting Routers Back to Back Through the AUX P
isco Connecting Routers Back to Back Through the AUX P Table of Contents Connecting Routers Back to Back Through the AUX Ports...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Skills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure
CCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where
HOW TO CONFIGURE CISCO FIREWALL PART I
HOW TO CONFIGURE CISCO FIREWALL PART I Cisco Abstract: Please find below a step by step process to configure the PIX Firewall from scratch. A simple scenario is given here where you have a corporate network
Understanding the Cisco VPN Client
Understanding the Cisco VPN Client The Cisco VPN Client for Windows (referred to in this user guide as VPN Client) is a software program that runs on a Microsoft Windows -based PC. The VPN Client on a
Lab - Using IOS CLI with Switch MAC Address Tables
Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A S1 VLAN 1 192.168.1.11 255.255.255.0 192.168.1.1 S2 VLAN 1 192.168.1.12
Network Management Card Security Implementation
[ APPLICATION NOTE #67 ] OFFER AT A GLANCE Offers Involved Network Management Card, APC Security Wizard Applications Configuration and monitoring of network managed devices Broad Customer Problem Secure
Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall
Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall This document is a step-by-step instruction for setting up VPN between Netgear ProSafe VPN firewall (FVS318 or FVM318) and Cisco PIX
Virtual Fragmentation Reassembly
Virtual Fragmentation Reassembly Currently, the Cisco IOS Firewall specifically context-based access control (CBAC) and the intrusion detection system (IDS) cannot identify the contents of the IP fragments
How To - Implement Clientless Single Sign On Authentication with Active Directory
How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:
Network Load Balancing
Network Load Balancing Step by Step installation of Network Load Balancing in Windows Server 2008 R2. Prerequisite for NLB Cluster 1. Log on to NODE1 Windows Server 2008 R2 system with a domain account
Configuring IKEv2 Load Balancer
The IKEv2 Load Balancer feature provides support for enabling clusters of FlexVPN gateways and distributes incoming Internet Key Exchange Version 2 (IKEv2) connection requests among FlexVPN gateways. This
Scenario: IPsec Remote-Access VPN Configuration
CHAPTER 3 Scenario: IPsec Remote-Access VPN Configuration This chapter describes how to use the security appliance to accept remote-access IPsec VPN connections. A remote-access VPN enables you to create
ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series
ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices Secure Access How-to User Series Author: Technical Marketing, Policy and Access, Security Business Group, Cisco Systems Date: January
Configuring the Switch with the CLI Setup Program
APPENDIXC Configuring the Switch with the CLI Setup Program This appendix provides a command-line interface (CLI) setup procedure for a standalone switch. To set up the switch by using Express Setup, see
VPN PPTP Application. Installation Guide
VPN PPTP Application Installation Guide 1 Configuring a Remote Access PPTP VPN Dial-in Connection A remote worker establishes a PPTP VPN connection with the head office using Microsoft's VPN Adapter (included
E-Mail: [email protected] Phone: 281-283-2828 Fax: 281-283-2969 Box: 230 http://www.uhcl.edu/uct
A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of FastEthernet Interfaces. All contents are Copyright 1992 2012
Connecting and Setting Up Your Laptop Computer
CHAPTER 3 Connecting and Setting Up Your Laptop Computer This chapter explains how to connect your laptop to the Cisco Unified MeetingPlace system and how to set up your laptop so that you can use HyperTerminal.
Encrypted Preshared Key
The feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Release Modification 12.3(2)T This feature was introduced. Finding Support Information
TABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
Lab 4.5.2 Diagramming Intranet Traffic Flows
Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
Objectives. Background. Required Resources. CCNA Security
Chapter 8 Lab B, Configuring a Remote Access VPN Server and Client Topology IP Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1 192.168.1.1 255.255.255.0 N/A
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
Module 6 Configure Remote Access VPN
Network Security 2 Module 6 Configure Remote Access VPN Learning Objectives 6.1 Introduction to Cisco Easy VPN 6.2 Configure the Easy VPN Server 6.3 Configure Easy VPN Remote for the Cisco VPN Client 4.x
Network Simulator Lab Study Plan
The CCNA 640-802 Network Simulator has 300 lab exercises, organized both by type (Skill Builder, Configuration Scenario, Troubleshooting Scenario, and Subnetting Exercise) and by major topic within each
Lab 5.5 Configuring Logging
Lab 5.5 Configuring Logging Learning Objectives Configure a router to log to a Syslog server Use Kiwi Syslog Daemon as a Syslog server Configure local buffering on a router Topology Diagram Scenario In
Firewall Authentication Proxy for FTP and Telnet Sessions
Firewall Authentication Proxy for FTP and Telnet Sessions First Published: May 14, 2003 Last Updated: August 10, 2010 Before the introduction of the Firewall Authentication Proxy for FTP and Telnet Sessions
Enabling Remote Access to the ACE
CHAPTER 2 This chapter describes how to configure remote access to the Cisco Application Control Engine (ACE) module by establishing a remote connection by using the Secure Shell (SSH) or Telnet protocols.
Configuring the Cisco PIX Firewall for SSH by Brian Ford ([email protected])
SSH Overview SSH is a client program that allows a user to establish a secure terminal session with a remote host that is running the SSH server (or daemon) program. Other programs, like the telnet utility
Lab - Observing DNS Resolution
Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the nslookup Command on Mail
Lab 4.5.4 Diagramming External Traffic Flows
Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1
Two-Factor Authentication
Two-Factor Authentication This document describes SonicWALL s implementation of two-factor authentication for SonicWALL SSL-VPN appliances. This document contains the following sections: Feature Overview
Managing Software and Configurations
55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page
Securing Windows Remote Desktop with CopSSH
Securing Windows Remote Desktop with CopSSH Presented by [email protected] If you enjoyed this article, please consider joining our Folding@Home team I like having the ability to remotely access
Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
Lab 8.4.3a Managing Cisco IOS Images with TFTP
Lab 8.4.3a Managing Cisco IOS Images with TFTP Host Device Name Interface IP Address Subnet Mask R1 R1 Fast Ethernet 0/0 172.17.0.1 255.255.0.0 Objectives Analyze the Cisco IOS image and router flash memory.
1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router
1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains
