Are you still telneting into your devices?

user-accessBy now I’m sure you’ve already read several articles that explained the pitfalls of using telnet to access your network devices, it’s not a secure way to access your network. Telnet does not offer any encryption, your login and password information is sent across the network in plain text.

Many Cisco devices today allow for SSH configuration. SSH not only allows for encryption of password and login information but also allows you devices to know who is logging in.

SSH can be configured easily on any Cisco device with IOS that supports DES or DES3 (should be using DES3).


Router (config) #username Joe password j03adM1n
Router (config) # ip domain-name mylab.local
Router (config) # crypto key generate rsa
Router (config) # line vty 0 4
Router (config-line) # transport input ssh
Router (config-line) # login local

Once you have your router configured for SSH, you will need to use a terminal program that supports SSH, such as PuTTY, Tera Term or SecureCRT.   Windows XP and Vista include a command line SSH capability, my personal favorite is SecureCRT.

This entry was posted in Cisco Bytes, My Blog and tagged , by Ron Staples. Bookmark the permalink.

About Ron Staples

Ron has been working in the data, voice technologies field for over 15 years, he obtain his CCNA in 1999 and has worked for several fortune 500 companies. Since then he has re certified his CCNA and earned the following additional certifications, CCNA Voice and CCRMS.

Leave a Reply

Your email address will not be published. Required fields are marked *