Enabling SSH on a Cisco Router for Secure Remote Login
- Ensure you have a hostname configured on your router:
Router#conf t
- Router(config)#hostname router23
- You must also configure a domain name:
Router(config)#ip domain-name jpt
- Generate an RSA keypair with a key length of 1024 bits using the following sequence of commands:
router(config)#
router(config)#crypto key generate rsa
- The name for the keys will be: routername.soundtraining.class (where routername is your router’s hostname)
- Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take a few minutes.
- How many bits in the modulus [512]: 1024% Generating 1024 bit RSA keys …[OK]
- Create a username in the router’s local database for SSH authentication using the following command (for the purpose of the exercise, use the username “user15”):
router01(config)#username user15 privilege 15 secret p@ssword
- Enable login authentication against the local database when logging in to a terminal line with the following commands:
router01(config)#line vty 0 15
- router01(config-line)#login local
- router01(config-line)#exec-timeout 0 0
- router01(config-line)#logging synchronous
- router01(config-line)#transport input ssh