1 hour 43 minutes
Hi. Everyone in this demo will become figuring Telnet and ssh!
The I P addresses have been configured on each device, So let's do a quick Ping verification test
from rotor zero. Let's start
17 to 16 55
and to the PC.
I got 10
and it's working.
Now let's head over to switch zero. To start configuring. Tell minutes
that's close this up.
Open switch. Syria's command
Naval Configured terminal.
for the command that will be entering in this called line, VT. Why 0 15?
So basically VT y stands for virtual teletype. It's the command used to configure for telnet or Ssh! And for zero and 15. It's basically
telling to configure multiple or simultaneous sessions where users can log in. There's actually a maximum number off 16 simultaneous users, so we'll be just configuring for this
straight. So enter
password. Let's use Cisco.
right before anything else will exit this for a moment
Configure or come 50
and one more command, which is enable
se Cisco 123
Assuming missed anything out. All right,
Okay, so let's soap in a PC zero Command prompt.
Let's Ping to the switch. $16 Fired at five.
Okay, there you go to some time. But there you go. Let's do that again.
so let's try to Telnet now. 17 to 16. Dog fired up. Five. Let's see if it's working. OK, great. So the earlier command under line Bt Why we entered a pass Ridge called Cisco. So let's try that out. Cisco
King is trying again.
And then enable. Okay, so this is where the Cisco 123 comes in.
So Cisco 123
All right, there you have it.
So if you are wondering, what's the difference of the enable secrets? Basically the log in credentials to enter into start configuring thesis which itself, while the earlier line Bt Y password
was basically the log in credentials to Telnet into the router or into this which I should say
there is another way, however, did not have to configure two different passwords as he Logan. We will demonstrate this in rather zero,
so let's close up Switch zero and PC's
Let's open runner zero
label configuration Terminal Worker T
and we will create a new credential
What can we use? For example?
I'm making this up as I go along. So let's say
this tray. Cisco 123 All right, enter
and it's how they were to line B Z y
and straight away. We just answer in Logan. Local
log in local means using the local user credentials that husband configured, which was the user name that we recently added. Which was Jenny
and oh yes, always remember to save your configurations so it's either right or copy. Run starts
and let's do that as well. First switch zero
Well, there's a pastor there. So this one was just school. 123
and copy, run, start or
right memory or a trip that we are
The score to PC zero
home and prom's
this pain the router
cake and see this a response and miss still doing other telnet 2172
16 5 What?
All right. So, user vein
And there you have it.
So we learned about tell it, but what about as a sage.
Let's see if we can.
That's exit router here.
And let's try to do it. S S H
Logan through the Jenny
Valid. All right. What else am I missing year
during the Oh, yes, the I P address. 172
16 thoughts $5 ones.
Let's have the world back to rather zero. Let's see what went missing
Blind bt wise. You're 15.
I think that's and in this command transport in foot.
always basically including telnet and ssh!
Let's see if this works on PCs zero.
Okay, it's still closing up. Let's tried to specify it a little bit more with ssh
is still dart
thing. Let me try one more, which is crypto key.
Gender rates are see.
Please defy the hosting on the router.
Okay, lets will have to change the host name right now. Our award
Que and the domain name
I paint told me
Let's just call this test.
Alright, let's try it now.
The fold 12
This girl was PC zero and do another.
password is school
They have it. Have access after going through all those configurations
Normally you wouldn't have to configure so much for just configuring. Ssh! But it is a good practice to know all these commands as well through Packet Tracer.
And as you saw me configuring earlier when I was troubleshooting,
you can actually filter out where the youth want to use both Telnet an ssh or just simply using as a sage.
Let's go to PC zero, for example.
That's exit from here
has tried to tell knits
So let's say you're trying to restrict this access.
Since, of course, we all know that
tell that uses clear text instead of encryption.
So let's exit here.
That's Heather Word to rudder zero
and let's go to line B T Y. 0 15
and the command is transport input.
That's his age.
Purely Ssh will be allowed. And let's test it out now.
All right, so tell net doesn't work.
What about this? This each
172 at 16 51
And there you have it. You can only access Arado zero through s a C
and we're now done with our Demel
Penetration Testing and Ethical Hacking
To assess the strength of your organization’s cybersecurity posture, you need to gather information, perform ...
7 CEU/CPE Hours Available
Certificate of Completion Offered
SCSM (System Center Service Manager)
The SCSM Assessment Test is a premium Cybrary assessment created by iMocha. This exam assesses ...