Enabling SSH on a Cisco Router for Secure Remote Login

  1. Ensure you have a hostname configured on your router:
    Router#conf t 
  2. Router(config)#hostname router23
  3. You must also configure a domain name:
    Router(config)#ip domain-name jpt
  4. Generate an RSA keypair with a key length of 1024 bits using the following sequence of commands:
    router(config)#
    router(config)#crypto key generate rsa
  5. The name for the keys will be: routername.soundtraining.class (where routername is your router’s hostname)
  6. Choose the size of the key modulus in the range of 360 to 2048 for your
      General Purpose Keys. Choosing a key modulus greater than 512 may take a few minutes.
  7. How many bits in the modulus [512]: 1024% Generating 1024 bit RSA keys …[OK]
  8. Create a username in the router’s local database for SSH authentication using the following command (for the purpose of the exercise, use the username “user15”):
    router01(config)#username user15 privilege 15 secret p@ssword
  9. Enable login authentication against the local database when logging in to a terminal line with the following commands:
    router01(config)#line vty 0 15
  10. router01(config-line)#login local
  11. router01(config-line)#exec-timeout 0 0
  12. router01(config-line)#logging synchronous
  13.  router01(config-line)#transport input ssh