16.4.7 Lab – Configure Network Devices with SSH Answers

Objectives: Configure fundamental device settings Configure the router for SSH access in Part 2. Part 3: Configure SSH Access on the Switch Part 4: SSH from the Switch's CLI Context / Scenario Historically, Telnet was the most used protocol for remotely configuring network devices. The information between the client and server is not encrypted when using Telnet. This enables a network sniffer to capture passwords and configuration data. The Secure Shell (SSH) protocol creates a secure terminal emulation connection to a router or other networking device. SSH encrypts all data sent over a network connection and authenticates the distant machine. SSH is quickly overtaking Telnet as the preferred remote login technique for network experts. The most common usage of SSH is to log into a distant device and execute instructions. It may also transmit files via Secure FTP (SFTP) and Secure Copy (SCP) protocols. The connecting network devices must be set to support SSH in order for SSH to ope...