Premium Essay

Secure Vty Line on Cisco Router

In:

Submitted By adolfaddison
Words 602
Pages 3
Securing VTY
Now that telnet is working, it’s a good idea to restrict which hosts have access to your router’s VTY lines. The general rule is to only allow the PC’s on your private network access to the router. Why? Because later on, when your router is connected to the Internet, it will prevent anyone on the Internet from gaining access to it.
In the Cisco IOS you control access to your router with an ACL. An ACL is a powerful
IOS tool that allows you to secure your router using a combination of IP addresses and protocols. In simple terms, an ACL is a list of rules that either permits or denies a host (or group of hosts) access to another host (or group of hosts) through your router. It’s a filter.
After you create your ACL, it’s applied to a VTY line or Ethernet interface, and you specify whether it’s filtering incoming or outgoing traffic.
I’ll go into more detail about ACLs later in this chapter. For now, let’s look at the ACL for telnet line by line in Listing 2-4.
Listing 2-4. How to Secure VTY (Telnet) with an ACL lab-r1(config)# ip access-list standard VTY-ACL lab-r1(config-std-nacl)# permit 192.168.1.0 0.0.0.255 lab-r1(config-std-nacl)# exit lab-r1(config)# line vty 0 4 lab-r1(config-line)# access-class VTY-ACL in
CHAPTER 2 ■ CONFIGURING YOUR ROUTER 29
Step 1: Create and Name Your ACL
The first thing you do is create and name your ACL. The name “VTY-ACL” is used in
Listing 2-4. You can use any name that makes sense to you, but it’s a good idea to use a name that will remind you of what the ACL is used for. The command for this is lab-r1(config)# ip access-list standard VTY-ACL
Notice from the following output that the prompt has changed to (config-std-nacl), indicating that you are in ACL configuration mode. The following is the prompt for a standard named ACL: lab-r1(config-std-nacl)# Now that you’ve named and created your ACL,

Similar Documents

Premium Essay

Netw 209 Lab 551

...no shutdown int s0/0/0 ip address 10.1.1.2 255.255.255.252 no shutdown int s0/0/1 ip address 10.2.2.1 255.255.255.252 clock rate 64000 no shutdown int Lo0 ip address 209.165.200. 225 255.255.255.224 router ospf 1 network 10.1.1.0. 0.0.0.3 area 0 network 10.2.2.0 0.0.0.3 area 0 network 192.168.20.0. 0.0.0.255 area 0 network 209.165.200.224. 0.0.0.31 area line con 0 logging synchronous password cisco login line vty 0 4 password cisco login exit S2- configs int vlan 1 ip address 192.168.11.2 255.255.255.0 no shutdown ip default- gateway 192.168.11.1 S1 S1(config)#enable secret class S1(config)#no ip domain-lookup S1(config)#line console % Incomplete command. S1(config)#line console 0 S1(config-line)#line vty 0 4 S1(config-line)#exit S1(config)#enable secret cisco S1(config)#line console 0 S1(config-line)#password cisco S1(config-line)#login S1(config-line)#line vty 0 4 S1(config-line)#password cisco S1(config-line)#login S1(config-line)#exit S1(config)#banner motd "message of the day" S1(config)#int vlan1 S1(config-if)#ip add 192.168.10.2 255.255.255.0 S1(config-if)#no shut S1(config-if)# *Mar 1 01:02:15.086: %LINK-3-UPDOWN: Interface Vlan1, changed state to up *Mar 1 01:02:15.094: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, cha nged state to up interface Vlan1 ip address 192.168.10.2 255.255.255.0 no ip route-cache S1(config)#ip default-gateway 192.168.10.1 S1(config)# interface Vlan1 ip...

Words: 804 - Pages: 4

Premium Essay

Ethics

...Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Security course as part of an official Cisco Networking Academy Program. Lab L - Initializing and Re g eloading a Rout and S g ter Switch (Instructo or Version) V Instructor No Red font color or Gray highlights ind ote: y dicate text tha appears in the instructor copy only. at Topology T Objectives O Part 1: Se Up Device in the Netw et es work as Show in the To wn opology Part 2: Initialize the Router and Reload R Part 3: Initialize the Switch and Reload S Backgroun / Scenar B nd rio Before sta arting a CCNA hands-on la that makes use of either a Cisco rout or switch, ensure that t A ab s ter the devices in use have be erased an have no st n een nd tartup configu urations prese Otherwise the results of your ent. e, lab may b unpredictab This lab p be ble. provides a de etail procedure for initializin and reload e ng ding a Cisco ro outer and a Cisco sw witch. Note: The routers used with CCNA hands-on lab are Cisco 1 e d bs 1941 Integrate Services R ed Routers (ISRs with s) Cisco IOS Release 15. S .2(4)M3 (univ versalk9 image). The switches used are Cisco Cataly 2960s with Cisco yst h IOS Relea 15.0(2) (lanbasek9 ima ase age). Other ro outers, switch hes, and Cisc IOS version can be use co ns ed. Depending on the mod and Cisco IOS version, the comman available a output pr...

Words: 45682 - Pages: 183

Premium Essay

Network 209 Week 4

...DEVRY LAB 4-1: BASIC SECURITY CONFIGURATION TASK 2: PERFORM BASIC ROUTER CONFIGURATIONS STEP 1: CONFIGURE ROUTERS Router(config)#hostname R1R1(config)#no ip domain lookupR1(config)#banner motd #Keep Out.#R1(config)#int fa0/1R1(config-if)#ip address 192.168.10.1 255.255.255.0R1(config-if)#no shutdownR1(config-if)#int s0/0/0R1(config-if)#ip address 10.1.1.1 255.255.255.252R1(config-if)#clock rate 64000R1(config-if)#no shutdownR1(config-if)#exitR1(config)#router ripR1(config-router)#version 2R1(config-router)#network 192.168.10.0R1(config-router)#network 10.0.0.0 | Router(config)#hostname R2R2(config)#no ip domain-lookupR2(config)#banner motd #keep out!!#R2(config)#line con 0R2(config-line)#password ciscoR2(config-line)#loginR2(config-line)#line vty 0 4R2(config-line)#password ciscoR2(config)#int fa 0/1R2(config-if)#ip add 192.168.20.1 255.255.255.0 R2(config-if)#no shutR2(config-if)#int s0/0/0R2(config-if)#ip address 10.1.1.2 255.255.255.252R2(config-if)#no shutR2(config-if)#int s0/0/1R2(config-if)#ip address 10.2.2.1 255.255.255.252R2(config-if)#clock rate 64000R2(config-if)#no shutR2(config)#router ripR2(config-router)#version 2R2(config-router)#network 192.168.20.0R2(config-router)#network 10.1.1.0R2(config-router)#network 10.2.2.0R2(config-router)#network 209.165.200.224R2(config-router)#endR2(config)#int loopback 0R2(config-if)#ip add 209.165.200.225 255.255.255.224R2(config-if)#no shut | Router(config)#hostname R3R3(config)#no ip domain lookupR3(config)#banner motd...

Words: 2587 - Pages: 11

Premium Essay

Network

...1. User EXEC * Router> Privileged EXEC * Router# Global Configuration Router (config) # Line Configuration Interface Configuration Router Configuration Router (config-line) # Router (config-if) # Router (config-router) # 2. Document the router prompt and full command to change the name of Austin’s router to AUS. * Router(config)#hostname AUS 2. Document the router prompt and full commands to configure AUS with the two global passwords that can be used to enter privileged EXEC mode. Use class as the password. AUS(config)#enable password class AUS(config)#enable secret class 3. If both are configured, which can serve as the password, and do you need to configure both? If both are configured, the enable secret password can be used. The enable password command is ignored. Therefore, you do not need to configure both. The enable password is still supported by the IOS for legacy purposes. Document the router prompt and full commands to configure the console port on AUS. Use the password cisco. * AUS(config)#line console 0 * AUS(config-line)#password cisco * AUS(config-line)#login * AUS(config-line)#exec-timeout 30 0 <--Optional * AUS(config-line)#logging synchronous <--Optional 5. Document the router prompt and full commands to configure the Telnet lines on AUS. Use the password cisco. AUS(config)#line vty 0 4 AUS(config-line)#password cisco AUS(config-line)#login AUS(config-line)#exec-timeout 30 0 <--Optional ...

Words: 2593 - Pages: 11

Premium Essay

Cisco Switch Configuration

...is very useful define the name of your Cisco switch/router. To do it: Enable administrative privilege Router>en Enter the configuration mode: Router#configure terminal Define the hostname (the name router is changed to Ciscozine) Router(config)#hostname Ciscozine Ciscozine(config)# Assign the privileged level secret The enable secret password allows you to enter enable mode (sometimes referred to as privileged mode or privileged-EXEC mode). To set a secret password: Enable administrative privilege Ciscozine>en Enter the configuration mode: Ciscozine#configure terminal Define the privileged-EXEC mode password; remember to use a strong password (combine letters, numbers, nd symbols). The enable secret command uses a one-way encryption hash based on Message Digest 5 (MD5) Ciscozine(config)#enable secret C1sc0z$n3 Secure console port For security reasons, you must define a console password: Enable administrative privilege Ciscozine>en Enter the configuration mode: Ciscozine#configure terminal Enter in the console configuration Ciscozine(config)#line console 0 Define your console password Ciscozine(config-line)#password g4S$%A2 Enable the password defined Ciscozine(config-line)#login Use the “logging synchronous” command, so the messages appear only after you press Return Ciscozine(config-line)#logging synchronous Secure VTY lines For security reasons, you must define a vty line password. The vty lines defines the password needed for a remote...

Words: 621 - Pages: 3

Premium Essay

Pt1420

...management capabilities with Telnet.  Save the switch running configuration file. Part 4: Manage the MAC Address Table  Record the MAC address of the host.  Determine the MAC addresses that the switch has learned.  List the show mac address-table command options.  Set up a static MAC address. Background / Scenario Cisco switches can be configured with a special IP address known as Switched Virtual Interface (SVI). The SVI or management address can be used for remote access to the switch to display or configure settings. If the VLAN 1 SVI is assigned an IP address, by default, all ports in VLAN 1 have access to the SVI management IP address. In this lab, you will build a simple topology using Ethernet LAN cabling and access a Cisco switch using the console and remote access methods. You will examine default switch configurations before configuring basic switch settings. These basic switch settings include device name, interface description, local passwords, message of the day (MOTD) banner, IP addressing, setting up a static MAC address, and demonstrating the © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 14 Lab – Configuring Basic Switch Settings use of a management IP address for remote switch management. The topology consists of one...

Words: 4660 - Pages: 19

Premium Essay

Ios Commands

...|Commands | |11.02: Command-Line Interface |Privilege EXCE Mode (Enable & Disable)|IOS> enable | |(CLI) | |IOS# | | | | | | | |IOS# disable | | | |IOS> | | |Login Out |IOS# logout | | | |-or- | | | |IOS# exit | |11.03: IOS Basics |Context-Sensitive Help |Router> ? | | | | | | | |Router# Command ? | | ...

Words: 2715 - Pages: 11

Premium Essay

Network

...switch running configuration file. Part 4: Manage the MAC Address Table Record the MAC address of the host. Determine the MAC addresses that the switch has learned. List the show mac address-table command options. Set up a static MAC address. Background / Scenario Cisco switches can be configured with a special IP address known as Switched Virtual Interface (SVI). The SVI or management address can be used for remote access to the switch to display or configure settings. If the VLAN 1 SVI is assigned an IP address, by default, all ports in VLAN 1 have access to the SVI management IP address. In this lab, you will build a simple topology using Ethernet LAN cabling and access a Cisco switch using the console and remote access methods. You will examine default switch configurations before configuring basic switch settings. These basic switch settings include device name, interface description, local passwords, message of the day (MOTD) banner, IP addressing, setting up a static MAC address, and demonstrating the use of a management IP address for remote switch management. The topology consists of one switch and one host using only Ethernet and console ports. Note: The switch used is a Cisco Catalyst 2960 with Cisco IOS Release 15.0(2)...

Words: 4262 - Pages: 18

Free Essay

Unit 3 Homework for Wan

...Router Prompt Exercise User Exec – routername> Privileged Exec – routername# Global Configuration – routername(config)# Line Configuration – routername(config-map-class)# Interface Configuration – routername(config-if)# Router Configuration – routername(config-line)# Basic Configuration Exercise 1. Router>enable Router#configure terminal Router(Config)#hostname AUS AUS(config)#end 2. AUS(config)# Enable Password class AUS(config)#Enable Secret class 3. Secret will supersede Password as the enable password. You do not need both, but you should have Secret over Password, as it is more secure. 4. AUS(config)#line con 0 AUS(config-line)#password cisco AUS(config-line)#login AUS(config-line)#line aux 0 AUS(config-line)#password cisco AUS(config-line)#login 5. AUS(config)#line vty 0 4 AUS(config)#password cisco AUS(config)#login 6. Aus(config)#service password-encryption 7. The secret password has stronger encryption than encrypting all passwords. 8. AUS(config)#line serial 0/0 AUS(config-if)#ip address 10.2.0.1 255.255.0.0 AUS(config-if)#clock rate 64000 AUS(config-if)#no shutdown 9. AUS(config)#interface fastethernet 0/0 AUS(config-if)#ip address 10.3.0.1 255.255.0.0 AUS(config-if)#no shutdown 11. AUS#copyrun start 12. show startup-config 14. Ping would be a good first choice. Show command Exercise 1. Show ip interface brief 2. Show interfaces 3. Show ip route 4. Show running-config 5. Show startup-config 6. The configuration...

Words: 339 - Pages: 2

Free Essay

Recommend Switch and Router

...Recommend Switch and Router Author Note This assignment is being submitted on September 13, 2013, for N235/CET2629 Section 02 Cisco Networking Fundamentals and Routing course. Recommend Switch and Router At the beginning of this course we were told to create a Cisco NOC environment for this ISP Company, and we were told to choose an ideal router for the job, the choices that we had were between the Cisco 1841 and the Cisco 2811. And I chose to use the Cisco 2811 router for this configuration for a lot of different reasons. But for this assignment I was asked that with knowing the security threats we face today if that would make me choose the 1841 over the 2811 and why? My answer is no I am going to stay with my current choice because he 2811 integrated service router provide the support in wire rate recital for synchronized services such as safety and voice and higher service to numerous T1/E1/DSL WAN rates. It also includes the on-board encryption; holds up to 1500 VPN channels with the AIM-EPI-PLUS module. Plus provides the antivirus protection hold up through system administration control. It secures the interruption anticipation as well as stateful cisco IOS firewall hold and other many more necessary safety characteristics. Here is a list of features this router provides. Cisco IOS Software Firewall, Secure Sockets Layer (SSL), Onboard VPN Encryption Acceleration, Network Admissions Control (NAC), Multiprotocol Label Switching (MPLS) VPN Support, USB eToken Support...

Words: 803 - Pages: 4

Free Essay

Using Ios Cli with Switch Mac Address Tables

...netw work devices according to the Addressin Table. a t ng Part 2: Ex xamine the Switch MAC Address Tab S A ble  the Use show commands to observ the proces of building t switch MA address ta s ve ss AC able. B Backgroun / Scenar nd rio The purpo of a Layer 2 LAN switc is to deliver Ethernet fra ose ch ames to host d devices on th local netwo The he ork. switch rec cords host MA addresses that are visible on the ne twork, and m AC s maps those MA addresses to its AC s own Ethernet switch po orts. This proc cess is called building the MAC address table. When a switch rec d n ceives a m amines the fra ame’s source and destinat tion MAC add dresses. The s source MAC address frame from a PC, it exa © 2013 Cisco and its affiliates. All rights reserve This docume is Cisco Publiic. d/or ed. ent Page 1 of 5 Lab - Using IOS CLI with Switch MAC Address Tables is recorded and mapped to the switch port from which it arrived. Then the destination MAC address is looked up in the MAC address table. If the destination MAC address is a known address, then the frame is forwarded out of the corresponding switch port of the MAC address. If the MAC address is unknown, then the frame is broadcast out of all switch ports, except the one from which it came. It is important to observe and understand the function...

Words: 1819 - Pages: 8

Premium Essay

Ccna

...CISCO 640-802 Cisco Certified Network Associate 251 Q&A Looking for Real Exam Questions for IT Certification Exams! We guarantee you can pass any IT certification exam at your first attempt with just 10-12 hours study of our guides. Our study guides contain actual exam questions, you will get word to word same on your actual test; accurate answers with detailed explanation verified by experts and all graphics and drag-n-drop exhibits shown just as on the real test. To test the quality of our guides, you can download the one-fourth portion of any guide from http://www.certificationking.com absolutely free. Besides, we also offer complete version of following exams absolutely free. You can start your certification from these free guides and if you are satisfied you can buy the rest ♦ Microsoft: 70-270, 70-305, 70-526, MB2-421 ♦ Cisco 642-901, 642-502, 642-425 ♦ Oracle: 1Z0-001, 1Z0-007, 1Z0-040, 1Z0-200 ♦ Novell: 50-676, 50-565 ♦ Adobe: 9A0-019 ♦ Apple: 9L0-004, 9L0-505, 9L0-606 ♦ 3COM: 3M0-211 ♦ Citrix: 1Y0-223, 1Y0-256 ♦ CIW: 1D0-420 ♦ EMC: E20-001 ♦ Enterasys: 2B0-011 ♦ Exam Express: EE0-011 ♦ Foundry: FN0-100 ♦ Hyperion: 4H0-002 ♦ HP: HP0-045, HP0-052, HP0-055, HP0-090, HP0-216, HP0-417 ♦ Juniper: JN0-120, JN0-330 ♦ Lotus: 190-510 ♦ Network Appliances: NS0-121 ♦ Network General: 1T6-520 ♦ Nortel: 920-430, 920-803 ♦ OMG: UM0-100 ♦ Sybase: 510-015 ♦ SAIR: 3X0-101, 201 ♦ SAS: A00-201 ♦ Tibco: TB0-103 ….. For pricing and placing order, please visit http://certificationking...

Words: 5081 - Pages: 21

Premium Essay

Part2 Cmit 350

...the xACME educational topology. Lastly, include the configuration steps for implementing device passwords on both console port (out-of-band communications) and VTY (Telnet/in-band communications). All passwords should be encrypted. Required Implementation: Configure all devices hostnames as per the xACME topology Configure encrypted passwords (console and Telnet ports) on all devices Configure MOTD and Login banner for one of the switches Create Server VLANS, Faculty VLANS, Instructional VLANS and Administrative VLANs on all switches Assign ports to VLANs on all switches Assign mode of access of VLANS Configure trunks between switches Make Switch1 as primary root bridge for all VLANs Configure security to protect from bogus BPDUs Configure Hostname: 1. Enable 2. Router# configure terminal 3. Router(config)#hostname (SpringfieldSw1, SpringfieldSw2, SpringfieldSw3, SpringfieldSw4) 4. End 5. Copy run start Creating Passwords: 1. Conf t 2. Enable password Cisco (or some other password) 3. Enable secret Cisco (or some other password) 4. End 5. Copy run start Create Console Password: 1. Conf t 2. Line con 0 3. Password “cisco” 4. Login 5. End 6. Copy run start Create Telnet Password: 1. Conf t 2. Line vty 0 4 3. Password “cisco” 4. Login 5. End 6. Copy run start...

Words: 3539 - Pages: 15

Premium Essay

Ccna 3 Pt Lab Manual

...This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Exploration: LAN Switching and Wireless course as part of an official Cisco Networking Academy Program. PT Activity 1.2.4: Build a Hierarchical Topology Topology Diagram Learning Objectives • • Add devices to a topology. Connect the devices. Introduction Packet Tracer is integrated throughout this course. You must know how to navigate the Packet Tracer environment to complete this course. Use the tutorials if you need a review of Packet Tracer fundamentals. The tutorials are located in the Packet Tracer Help menu. This activity focuses on building a hierarchical topology, from the core to the distribution and access layers. All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3 CCNA Exploration LAN Switching and Wireless: LAN Design PT Activity 1.2.4: Build a Hierarchical Topology Task 1: Add Devices to the Topology Step 1. Add the missing distribution layer routers. The routers you need are located in Custom Made Devices. R1 and R3 are 1841 routers. Ctrl-click the 1841 router to add more than one. Press ESC to cancel. R2 is a 2621XM router. Step 2. Add the remaining access layer switches. Following the topology diagram, add nine 2960-24TT switches to complete the rest of the access...

Words: 48601 - Pages: 195

Premium Essay

Bbhead

...access control 3. Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network? address translation DHCP services ftpd web server 4. What is true regarding network layer addressing? (Choose three.) uses a flat structure prevent broadcasts heirarchical uniquely identifies each host 48 bits in length contains a network portion 5. Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured? leaving host A leaving ATL leaving Dallas leaving NYC 6. Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown? 1 3 4 5 7 7. A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure? console enable enable secret VTY 8. Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational? 127.0.0.1...

Words: 2025 - Pages: 9