- telnet traffic is sent in a clear text way, so it is not secure.
- It is a client/server protocol that encrypt the traffic in and out through vty ports.
- By default cisco router & switches act as SSH clients.
- To make CISCO router & switches act as SSH servers they must be configured.
- Authentications is required to connect clients.
- This authentication can be username & password or authentication with a AAA server .
- There are 2 versions in SSH
- Version 2 more secure than the Version 1.
- Cisco devices supports both versions.
- Must specify which version u want use.
- Configuring basic SSH Server requires following steps:
- Check IOS support ssh or not.
- Configure a host name (if already config leave it)
- Config a domain name. (if already config leave it)
- Config a client authentication method.
- Router or Switch generate RSA keys that will be used to encrypt the session.
- specify the SSH version, if u want to use version 2.
- Disable telnet on the VTY lines.
- Enable SSH on the VTY lines.
Wednesday, May 23, 2012
SSH: SECURE SHELL PROTOCOL
SECUIRITY
- 3 Modes to access the user mode is:
- CONSOLE
- AUX
- TELNET
- Simple user mode CLI password protection
- line con 0
- login
- password cisco
- line vty 0 15
- login
- password cisco
- these passwords are stored as clear text in the configuration
- these passwords are encrypted by service password-encryption command
- service password-encryption
- line console 0
- password 7 "type pass here"
- login
- line vty 0 4
- password 7 "type pass here"
- login
- after service password-encryption command is added to configuration, all clear text passwords in the running configuration are changed to an encrypted value.
- Untill copy run start , passwords in startup config are not encrypted.
- no service password-encryption command cannot automatically decrypt the encrypted passwords.
- This type encryption is weak, using some public tools can easily decrypt the passwords.
Subscribe to:
Posts (Atom)