Ccna security Lab Securing the Router for Administrative Access Topology


Step 6: Verify the SSH configuration



Download 177.12 Kb.
Page16/51
Date16.12.2020
Size177.12 Kb.
#54690
1   ...   12   13   14   15   16   17   18   19   ...   51
2.6.1.2 Lab STU-converted

Step 6: Verify the SSH configuration.


  1. Use the show ip ssh command to see the current settings.

R1# show ip ssh

  1. Fill in the following information based on the output of the show ip ssh command. SSH version enabled: Authentication timeout: Authentication retries:

Step 7: Configure SSH timeouts and authentication parameters.


The default SSH timeouts and authentication parameters can be altered to be more restrictive using the following commands.

R1(config)# ip ssh time-out 90

R1(config)# ip ssh authentication-retries 2

Step 8: Save the running-config to the startup-config.

R1# copy running-config startup-config


Task 5: Research Terminal Emulation Client Software and Configure the SSH Client.
Step 1: Research terminal emulation client software.

Conduct a web search for freeware terminal emulation client software, such as TeraTerm or PuTTy. What are some capabilities of each?









Download 177.12 Kb.

Share with your friends:
1   ...   12   13   14   15   16   17   18   19   ...   51




The database is protected by copyright ©ininet.org 2024
send message

    Main page