Compare cert salaries and plan your next career move
theodoxa wrote: » 1. Router>en 2. Router#config t 3. Router(config)#user admin secret password 4. Router(config)#line vty 0 15 5. Router(config-line)#trans in ssh 6. Router(config-line)#login local 7. Router(config-line)#end 8. Router#wr 1. Enters Enable/Priviledged Mode 2. Enters Global Configuration Mode 3. Creates a User "admin" with a Password "password" that is stored encrypted (with I believe MD5). You could also type user admin password password if you want the password to remain unencrypted. 4. Enters Line Configuration Mode 5. Allows only SSH Connections. Use trans in telnet or trans in telnet ssh if you would prefer to only allow Telnet (some IOS images don't support SSH, making Telnet the only option until you upgrade the IOS) or allow both. 6. Uses Local AAA Authentication [or at least that is how I understood it from Lammle's book.] 7. Returns to Enable/Priviledged Mode 8. Saves Your Configuration to NVRAM
gregorio323 wrote: » On step 6. It uses local user accounts that were created by the "username" statement.
theodoxa wrote: » That's what I had thought (just a local user account), but then I had read something about how a router could act as both the Authentication Server and Authenticator to perform AAA without the need for a separate [TACACS+ or RADIUS] server and that had me wondering.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.