Ccna security Lab Securing Administrative Access Using aaa and radius


Test the new account by logging in from a Telnet session



Download 271.01 Kb.
Page9/30
Date24.06.2021
Size271.01 Kb.
#56943
1   ...   5   6   7   8   9   10   11   12   ...   30
3.6.1.1 Lab
3.6.1.1 Lab

Test the new account by logging in from a Telnet session.


  1. From PC-A, establish a Telnet session with R1.

PC-A> telnet 192.168.1.1

        1. Were you prompted for a user account? Explain.

No, the vty lines were not set to use the locally defined accounts as the line 0 console was.

        1. Set the vty lines to use the locally defined login accounts and configure the transport input command to allow Telnet.

R1(config)# line vty 0 4

R1(config-line)# login local

R1(config-line)# transport input telnet

R1(config-line)# exit



        1. From PC-A, telnet R1 to R1 again.

PC-A> telnet 192.168.1.1

Were you prompted for a user account? Explain.

Yes, the vty lines now are set to use locally defined accounts.


        1. Log in as user01 with a password of user01pass.

        2. While connected to R1 via Telnet, access privileged EXEC mode with the enable command.

What password did you use?

____________________________________________________________________________________




        1. For added security, set the aux port to use the locally defined login accounts.

R1(config)# line aux 0

R1(config-line)# login local



        1. End the Telnet session with the exit command.

      1. Download 271.01 Kb.

        Share with your friends:
1   ...   5   6   7   8   9   10   11   12   ...   30




The database is protected by copyright ©ininet.org 2024
send message

    Main page