🔒

Network Device Security Overview

Jul 3, 2025

Overview

This lecture covers secure remote management of network devices using SSH, console port security, management IP for Layer 2 switches, Telnet configuration, and key SSH commands for the CCNA exam.

Console Port Security

  • By default, no password is required to access the CLI via the console port.
  • Configure a console password with line console 0, then password <value>, and login to require the password.
  • Only one user can connect via the console line at a time.
  • For enhanced security, use login local with configured usernames and passwords on the device.
  • Configure an inactivity logout timer with the exec-timeout command.

Management IP on Layer 2 Switches

  • Layer 2 switches can be managed remotely by assigning an IP address to a Switch Virtual Interface (SVI).
  • Use interface vlan <id>, then ip address <ip> <mask>, and no shutdown to enable the interface.
  • Set a default gateway with ip default-gateway <gateway> for communication outside the local LAN.

Telnet Overview and Configuration

  • Telnet is an old protocol (1969) for remote CLI access, sending all data in plain text (not secure).
  • Telnet uses TCP port 23; the device being accessed is the server, the connecting device is the client.
  • Configure Telnet access on the VTY lines (line vty 0 15) with login local, exec-timeout, and transport input telnet.
  • You can restrict access using an ACL applied with the access-class command.

SSH (Secure Shell)

  • SSH, developed in 1995, encrypts all data and uses TCP port 22 for secure remote CLI access.
  • SSH version 2 (2006) is more secure than version 1; devices supporting both show version 1.99.
  • SSH requires a non-default hostname, a domain name, and RSA key generation.
  • Generate keys after setting hostname and domain with crypto key generate rsa modulus <size>, size ≥ 768 bits for SSHv2.
  • Enable SSH version 2 with ip ssh version 2.
  • Configure VTY lines with login local, exec-timeout, transport input ssh, and optional ACL for security.

CCNA Exam Q&A Highlights

  • Both hostname and domain name are required before generating RSA keys.
  • transport input telnet ssh or transport input all allows both protocols on VTY lines.
  • Use access-class on VTY lines to restrict SSH access by IP.
  • K9 IOS images support SSH; RSA key modulus must be at least 768 bits for SSHv2.
  • For remote SSH, the switch or router acts as the SSH server, and the connecting PC is the client.

Key Terms & Definitions

  • Console Port — Physical port for direct CLI access to a device.
  • VTY Lines — Virtual lines for remote CLI access via Telnet or SSH.
  • SSH (Secure Shell) — Encrypted protocol for secure CLI access; uses TCP port 22.
  • Telnet — Legacy protocol for remote CLI access; unencrypted; uses TCP port 23.
  • SVI (Switch Virtual Interface) — Virtual interface on a switch for management IP.
  • ACL (Access Control List) — Used to restrict access based on IP addresses.
  • RSA Keys — Cryptographic keys generated for enabling SSH.
  • K9 IOS Image — Cisco IOS image version that supports cryptographic features like SSH.

Action Items / Next Steps

  • Practice configuring SSH and related commands in a lab or Packet Tracer.
  • Review flashcards and complete the provided Packet Tracer labs.
  • For further understanding, revisit the command explanations and examples.