Ccna security Lab Securing the Router for Administrative Access


Test the new account by logging in from a Telnet session



Download 211.3 Kb.
Page12/54
Date19.03.2022
Size211.3 Kb.
#58466
1   ...   8   9   10   11   12   13   14   15   ...   54
2.6.1.2 Lab - Securing the Router for Administrative Access

Test the new account by logging in from a Telnet session.


  1. From PC-A, establish a Telnet session with R1. Telnet is disabled by default in Windows 7. If necessary, search online for the steps to enable Telnet in Windows 7.

PC-A> telnet 192.168.1.1

Were you prompted for a user account? Explain.

No, the vty lines were not set to use the locally defined accounts.


        1. Set the vty lines to use the locally defined login accounts.

R1(config)# line vty 0 4

R1(config-line)# login local



        1. From PC-A, telnet to R1 again.

PC-A> telnet 192.168.1.1

Were you prompted for a user account? Explain.

Yes, the vty lines are now set to use the locally defined account.


        1. Log in as user01 with a password of user01pass.

        2. During the Telnet session to R1, access privileged EXEC mode with the enable command.

What password did you use?

The enable secret password -> cisco12345



        1. For added security, set the AUX port to use the locally defined login accounts.

R1(config)# line aux 0

R1(config-line)# login local



        1. End the Telnet session with the exit command.

    1. Download 211.3 Kb.

      Share with your friends:
1   ...   8   9   10   11   12   13   14   15   ...   54




The database is protected by copyright ©ininet.org 2024
send message

    Main page