Time
1 hour 43 minutes
Difficulty
Intermediate
CEU/CPE
2

Video Transcription

00:00
Hi. Everyone in this demo will become figuring Telnet and ssh!
00:07
The I P addresses have been configured on each device, So let's do a quick Ping verification test
00:14
from rotor zero. Let's start
00:19
17 to 16 55
00:26
All right,
00:28
and to the PC.
00:33
I got 10
00:36
and it's working.
00:39
Great.
00:43
Now let's head over to switch zero. To start configuring. Tell minutes
00:48
that's close this up.
00:50
Open switch. Syria's command
00:53
Naval Configured terminal.
00:58
And so
01:00
for the command that will be entering in this called line, VT. Why 0 15?
01:06
So basically VT y stands for virtual teletype. It's the command used to configure for telnet or Ssh! And for zero and 15. It's basically
01:17
telling to configure multiple or simultaneous sessions where users can log in. There's actually a maximum number off 16 simultaneous users, so we'll be just configuring for this
01:30
straight. So enter
01:34
password. Let's use Cisco.
01:40
Enter
01:42
log in,
01:45
enter
01:46
right before anything else will exit this for a moment
01:51
or end.
01:53
Configure or come 50
01:57
and one more command, which is enable
02:01
Secrets
02:05
se Cisco 123
02:09
Assuming missed anything out. All right,
02:12
enter
02:14
end.
02:16
Okay, so let's soap in a PC zero Command prompt.
02:23
Let's Ping to the switch. $16 Fired at five.
02:34
Okay, there you go to some time. But there you go. Let's do that again.
02:39
All right,
02:40
so let's try to Telnet now. 17 to 16. Dog fired up. Five. Let's see if it's working. OK, great. So the earlier command under line Bt Why we entered a pass Ridge called Cisco. So let's try that out. Cisco
02:59
King is trying again.
03:01
Okay, great.
03:02
And then enable. Okay, so this is where the Cisco 123 comes in.
03:08
So Cisco 123
03:13
All right, there you have it.
03:16
So if you are wondering, what's the difference of the enable secrets? Basically the log in credentials to enter into start configuring thesis which itself, while the earlier line Bt Y password
03:30
was basically the log in credentials to Telnet into the router or into this which I should say
03:40
there is another way, however, did not have to configure two different passwords as he Logan. We will demonstrate this in rather zero,
03:49
so let's close up Switch zero and PC's
03:55
Let's open runner zero
03:59
label configuration Terminal Worker T
04:04
and we will create a new credential
04:08
user name.
04:11
What can we use? For example?
04:14
I'm making this up as I go along. So let's say
04:17
really
04:19
All right.
04:20
Privilege 15.
04:25
And secrets
04:28
this tray. Cisco 123 All right, enter
04:33
and it's how they were to line B Z y
04:36
0 15
04:43
and straight away. We just answer in Logan. Local
04:46
log in local means using the local user credentials that husband configured, which was the user name that we recently added. Which was Jenny
04:56
All right,
04:58
and
05:00
and oh yes, always remember to save your configurations so it's either right or copy. Run starts
05:09
and let's do that as well. First switch zero
05:13
today Go.
05:14
Well, there's a pastor there. So this one was just school. 123
05:18
and copy, run, start or
05:23
right memory or a trip that we are
05:28
right.
05:30
The score to PC zero
05:32
home and prom's
05:34
this pain the router
05:39
5.1
05:42
cake and see this a response and miss still doing other telnet 2172
05:49
16 5 What?
05:53
All right. So, user vein
05:55
Jenny
05:57
Password
05:58
Cisco 123
06:00
And there you have it.
06:02
Awesome.
06:04
So we learned about tell it, but what about as a sage.
06:09
Let's see if we can.
06:11
That's exit router here.
06:14
And let's try to do it. S S H
06:17
Logan through the Jenny
06:19
User credential.
06:23
Valid. All right. What else am I missing year
06:27
during the Oh, yes, the I P address. 172
06:31
16 thoughts $5 ones.
06:39
Let's have the world back to rather zero. Let's see what went missing
06:45
Blind bt wise. You're 15.
06:48
I think that's and in this command transport in foot.
06:54
Oh,
06:56
always basically including telnet and ssh!
07:00
Let's see if this works on PCs zero.
07:04
Okay, it's still closing up. Let's tried to specify it a little bit more with ssh
07:14
is still dart
07:15
thing. Let me try one more, which is crypto key.
07:25
Gender rates are see.
07:30
Please defy the hosting on the router.
07:32
Okay, lets will have to change the host name right now. Our award
07:39
Que and the domain name
07:42
I paint told me
07:47
Let's just call this test.
07:51
Alright, let's try it now.
07:58
Okay,
08:00
The fold 12
08:03
This girl was PC zero and do another.
08:09
Uh, so
08:11
password is school
08:15
123
08:16
They have it. Have access after going through all those configurations
08:22
Normally you wouldn't have to configure so much for just configuring. Ssh! But it is a good practice to know all these commands as well through Packet Tracer.
08:33
And as you saw me configuring earlier when I was troubleshooting,
08:39
you can actually filter out where the youth want to use both Telnet an ssh or just simply using as a sage.
08:48
Let's go to PC zero, for example.
08:54
That's exit from here
08:56
has tried to tell knits
08:58
$5.1.
09:01
So let's say you're trying to restrict this access.
09:05
Since, of course, we all know that
09:09
tell that uses clear text instead of encryption.
09:13
So let's exit here.
09:16
That's Heather Word to rudder zero
09:22
and let's go to line B T Y. 0 15
09:28
and the command is transport input.
09:33
That's his age.
09:35
Purely Ssh will be allowed. And let's test it out now.
09:41
All right, so tell net doesn't work.
09:45
What about this? This each
09:48
172 at 16 51
09:52
Do you
09:54
Cisco? 123
09:56
And there you have it. You can only access Arado zero through s a C
10:03
and we're now done with our Demel

Up Next

Network Operational Management

This course is designed to help network specialists understand the responsibilities and best practices involved with monitoring and managing network operations.

Instructed By

Instructor Profile Image
Sheane Jayne
Network Engineer
Instructor