D4rkn3S Posted July 31, 2015 Share Posted July 31, 2015 (edited) Hello members, I will write about this topic How to setup and config SSH, use the program simulator This is the hidden content, please Sign In or Sign Up [HIDE-THANKS] SSH is a protocol that uses port 22 and is encrypted connection, and there is such a protocol is Telnet, which is used for remote connection for routers or switches, and uses 23 port, but is vulnerable, such a union at the time of danger as follows, attacker- may use any sniffer ( The program that does snifings, is available to everyone, for example Wireshark, etc.) and may be obtained at the Union passwords or any information transmitted, frames. Let's just install, it is simple and check the files, open the Cisco Packet treiser. The task is the following, click twice to open PC1 and Telnet with remote switches, follow the instructions. This is the hidden content, please Sign In or Sign Up Go to desktop and then terminal. This is the hidden content, please Sign In or Sign Up (I have been given IP addresses) Open a terminal, write command to connect Telnet. This is the hidden content, please Sign In or Sign Up 10.10.10.2 is the IP address of the managment wlan and telnet port is a 23. on screen come this message This is the hidden content, please Sign In or Sign Up Where to write password.password i use default is cisco and opened for user - or Restricted switch terminal, we would move to a privileged user mode, you need write the following commands to enable or simply abbreviated en. user exec mode This is the hidden content, please Sign In or Sign Up after command "enable" we are user privileged exec mode,Privileged user mode, this will require the password that is the same and will have the following picture that shows preference for a "privileged customers" and we can already do config.The task as follows, following the order of the current configuration does need save. This is the hidden content, please Sign In or Sign Up It will save the current configuration,if we have incorrect configuration at next time we can return to the same configuration of the This is the hidden content, please Sign In or Sign Up Terminal write the following This is the hidden content, please Sign In or Sign Up click on the keyboard enter and save the current configuration. The task continues and tells us what we can see the current configuration of the next order of the show running-config or show run will open the following. This is the hidden content, please Sign In or Sign Up We can see here that is clear text passwords, look at it after the hostname S1- where the password is written to This is the hidden content, please Sign In or Sign Up where cisco is a password. We must encript "open passwords" following the order, first moving to the configuration mode command, write terminal This is the hidden content, please Sign In or Sign Up or This is the hidden content, please Sign In or Sign Up where you write the following This is the hidden content, please Sign In or Sign Up and write enter,after this write This is the hidden content, please Sign In or Sign Up to come out of the configuration mode and return to privileged user mode. This is the hidden content, please Sign In or Sign Up PS: Here's written orders that have a lot of work pressure in the beginning and then the tab order to fully move to a new line, and he collected the next stage of the order of ... Check and make sure you tell us whether the passwords are encrypted. This is the hidden content, please Sign In or Sign Up and see where all of the following commands to write the password is encrypted, from the waste that is to be encrypted, or SSH connection to Install Next This is the hidden content, please Sign In or Sign Up As we said the passwords encripted.lets start SSH- setup, we need domain name here to be written because some information is still needed to prevent the development of a encript.write Global configuration mode This is the hidden content, please Sign In or Sign Up commands This is the hidden content, please Sign In or Sign Up and domain name the time makes task tells us netacad. pka This is the hidden content, please Sign In or Sign Up After that here we need cript algorithm that is RSA. For a write command This is the hidden content, please Sign In or Sign Up and passed out where we need to choose the key size in 1024. This is the hidden content, please Sign In or Sign Up Small deviations do exist symmetric 512 and asymmetrical 1024 encryption system of this algorithm where the 512 is one of the key used by everyone and asymmetrical 1024 Two key that one private and other public, public spread can that is available to everyone and decryption key will be the same which we are going for our private decryption, as we said public everyone used only for decryption or asymmetric 1024-bit key can.now i choosing 1024 bit asymetric key. (sori to my bad inglish...) Then write the following command to SSH-'s diseases in the following order of user name and password. This is the hidden content, please Sign In or Sign Up in the same configuration mode. After this we go to the VTY- lines which means "layers", (I do not mean the interfaces, the total is 15, and begins dialing the order of 1 to 16 is considered to be from 0 to 15) .The assignment as it is divided into 0 to 4 and 5 to 15 we wrote it down one by one. write this command to go this VTY lines This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up line vty 0 4 because the assignment was given separately as it does us harm scores. now write the command to following order of connection. This is the hidden content, please Sign In or Sign Up And then write this command, where we can set of the locality ssh. This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up now write This is the hidden content, please Sign In or Sign Up step the back end write command configuration mode command This is the hidden content, please Sign In or Sign Up as it did 4 inclusive, and they have the same repeat This is the hidden content, please Sign In or Sign Up After login local we need to remove the passwords to the next order of This is the hidden content, please Sign In or Sign Up . come out telnet and write command for ssh This is the hidden content, please Sign In or Sign Up (login or the password is put on top of the administrator) and IP address This is the hidden content, please Sign In or Sign Up sorry all members to my bad inglish,I used google translate:mr47_05: [/HIDE-THANKS] Edited July 31, 2015 by D4rkn3S Link to comment Share on other sites More sharing options...
Recommended Posts