Time
23 hours 18 minutes
Difficulty
Beginner
CEU/CPE
14

Video Transcription

00:01
Hello and welcome to I C and D one interconnecting Cisco networking devices. Part one This is episode 23 to securing switch. See Ally with usernames and passwords. I am Trend Arrow would be a structure for this course.
00:14
The last video went over the lesson 2.3 overview. It's a pre assessment questions. In this episode, we're gonna be covering the setting the line Passwords for the Consul port. Tell men S S H. We will set up a local user name and password database for logging in.
00:28
And lastly, we will touch upon why we use external authentication servers.
00:34
So are learning objectives for this. We're gonna set the line passwords for the telling. That s his H and Consul ports.
00:40
We're gonna create a local database of user names and passwords for logging in, and we're gonna duck a brief bit about the external authentication servers or triple A servers.
00:51
So a quick pre assessment here, what is the difference between the enable password
00:56
and the enables? Secret commands give you shoes seconds to positivity on trying to figure it out.
01:03
All right. Hopefully you remember this from our previous lessons here.
01:08
Remember that the
01:11
enable. The Secret Command is MD five hashed. The password is clear. Text in the running of Vic.
01:18
All right, so setting the live passwords here are the commands you're gonna want to know to get into him here.
01:23
So I'm gonna go ahead and bring up my party session.
01:27
Get that going. And as you can see, we're gonna go ahead and counsel port into it right now.
01:34
So we get this going. Certainly enter bringing soap, Okay? We're into user mode. We're gonna enable
01:41
All right, So we're going to figure terminal
01:45
line counsel zero.
01:51
And we're just gonna do so if we leave from here. There's quite a bit we can still d'oh!
01:57
If you look here, we're going to set a basic password. Something cute.
02:00
Close it
02:01
Password. And
02:05
where is gonna set it for Cyber Eri?
02:09
And again if we do a showrunner
02:13
began at
02:15
counsel.
02:16
You'll see that.
02:21
Oh, I see. What do you
02:23
At line
02:28
you see, the password is in clear text here,
02:31
and it's the same thing. If we go into the
02:35
you want to set the SS h password like that,
02:38
we go into line
02:40
t y
02:43
and zero space 15 cause that'll include all
02:46
15 lines for the virtual terminals.
02:52
And we do password,
02:54
and we'll just do cyberia again.
03:00
And
03:01
so those are just sitting that line passwords.
03:04
So go ahead, give her the party procession.
03:07
Summer was just to get into it. You knew Could figure terminal. And then you do the line counsel zero to get in the council connections and in the line V t Y 0 15
03:16
Let me actually show you I'm gonna disconnect out of my party session to exit.
03:22
So it just connected, and I want to go back into it.
03:27
All right, so we need to set the
03:30
log in style as well. So I'm going to line it can
03:35
because zero
03:38
log in
03:42
that will do.
03:44
Just log in.
03:46
And same thing if we do the line of E. T Y 0 15
03:52
who's set log in as well and
03:54
exits.
03:59
All right, so now it's recording a password. Someone taken cyber, bury it, enter
04:02
and we're now in. It'll be the same thing when we set up. Sshh. Right now it is set for
04:09
password.
04:10
They're for telling that. Excuse me,
04:15
so give it to the party session.
04:20
I do.
04:23
All right, so now we're gonna set up a local use named database. This is what you actually need to set up for
04:28
for S S H. And it's a better system. You'll see why here in a minute.
04:32
This will not replace the enable password they had to set. You can't set.
04:38
Um, it's still your password that you set on the VT y lines of the council.
04:43
So if you go to line our excuse me t
04:47
beauty wise or 15
04:51
this one of two set this will do log in local, which says to use the local using database
05:00
and
05:02
a cup of tea
05:06
zero
05:10
again, local.
05:13
And if we do a show run here,
05:16
you'll see that there is currently no use news of passwords.
05:23
And right now So what we do is go to configure terminal.
05:29
We'll do use your name
05:30
trunked secret
05:34
cyber.
05:36
And remember, the difference in secret and password is secret. Is MD five hashed and passport is clear. Text
05:44
snow If we run a show run,
05:47
we will see the user name and you know
05:53
and was exit.
05:56
So now it's asking for a user name When we go in since we set that log in local sitting Well, do Trent
06:02
taping Cyber Eri
06:04
And now we're in.
06:09
Come on
06:10
there.
06:11
All right, So why we would might use the Jews named Password database. So I'm just gonna go in and change
06:18
an interface here. Police phaser. One
06:23
description left up.
06:27
And
06:30
so right here is why would use it? Could've figured by trends.
06:34
So it gives you a little bit accountability of who has changed your switch configuration.
06:41
It's a little bit about the extent with the authentication and authorization servers. So they're also called Tripoli servers, which is authentication, authorization and accounting. Authentication says, you know, is this who you are? You know, you're you're trying to be trackless aired. You're trying to be someone. So this says are you know, do you have the credentials
06:59
to be this person? Authorization is
07:01
what are you allowed to do on this server? What do you want to do on a switch? Accounting is Think of it as locking, right. It logs what you do in that switch.
07:12
Why might we use the external Tripoli servers?
07:15
So you think about an enterprise with maybe 100 switches? Let's say you are on boarding a new I t. Person and
07:24
you don't want to go around to every single switch and, you know, use your name,
07:28
user one pattern, you know, secret password one.
07:30
You don't do it every single server and said you can set all of them to talk to this external triple A server.
07:38
And then you can just add that one person in the server or if someone leaves, you don't have to remove them from every single switch and router. You can just remove them from the Triple A server
07:47
s o, the two triple A service. And, you know, for this exam is the radius, which is a remote authentication dialling user service.
07:56
Um,
07:58
it's a little older. The Tech X plus is the terminal access controller access control service. Plus,
08:05
thankfully, we use acronyms because terrible to say
08:09
so, take explosives. Really nice, because you can actually set what commands you can like. Each person can use anything, so you know you don't want your help that's going in and changing all your routes are changing. You know, switch virtual interfaces or changing the lands.
08:24
You can only if you want to. You can set to help this group's just you show command. So that way they can try and trouble Su stuff where they can't actually gonna figure stuff.
08:33
It's kind of nice in that aspect is you can set exactly what each person d'oh!
08:39
So we're going to the post assessment here, and both the user name and password is set on a switch and a line password is set.
08:48
Wish will switch use.
08:52
All right, hope you figure this out. Remember,
08:56
it depends on if the log in local or log in is set on the like configuration. Remember, when it's set to just log in,
09:01
it's just gonna ask for that password, right? It's just gonna want that log in password for that line. What if he's logging local than it's going to use that user name and password database that set on the switch?
09:15
It's usually good to go back and clean nose out out of your running confessed that way. If someone does get access, they can't look into running configured, try and guess what the pastor's might be.
09:24
So, in the next episode, we're gonna set up Sshh, we're gonna come configure that remote interface from management.
09:31
And, as always, if you guys have questions or need some help, feel free to shoot me a message. All right. Thank you for watching this episode and look forward to senior next one.

Up Next

CCNA ICND1

This course will enable students to understand virtualization and cloud services, and network programmability related to LAN, access and core segments.

Instructed By

Instructor Profile Image
Trenton Darrow
Network Engineer at NCI Information Systems, Inc
Instructor