To configure it, we will use “ ip ssh version 2” command. The second one provide more enhanced security agorithm. There are two SSH versions, SSH version 1 and SSH version 2. With this command, we can use local router users to ssh access.Īfter that, we will configure the the version of SSH. Then, we will set the login as local with “ login local” command. And then we will use “ transport input ssh”. Here, we will do the SSH configuration in line mode.įirstly, we will go to line mode and configure SSH for 16 users from 0 to 15. The main configuration step of this Configuring SSH lesson is this step. We will use this username and password for SSH connection.
Our user is gokhan, password is abc123 and the priviledge mode is 15.ĪBC (config) # username gokhan privilege 15 password abc123 We will do it with username, password and the priviledge level. This step is the classical user definion on the router. So we will use 512 here.ĪBC (config)# crypto key generate rsa general-keys modules 512 And after that, we will encrypt the data in it with “ crypto key generate rsa” command.ĭuring this configuration we will set the module sizes. In this step, we will set the domain name. Here, the default name is Router, let’s change this name to ABC. We need to change the default router name to generate rsa key. You can visit Cisco Hands On Course with Packet Tracerīefore configuring SSH, firstly, we will configure IP addresses of router interface and the PC. So, let’s start SSH Configuration and see how is the backplane config of our SSH connection on routers. So, what will be our SSH Config steps? In this example, we will go through the below six steps one by one: In this lesson, we will focus on SSH Configuration on Cisco routers with an SSH Config Example. Especially because of SSH is more secure, it is always prefered more than Telnet. It helps us to connect our routers, swithces and any other network equipments. As a secured alternative of Telnet, SSH is always in the life of a network engineer. SSH (Secure Shell) is one of the most used protocols in network World.