Be a loving person rather than in a love relationship because relationships happen one day and disappear another day. They are flowers; in the morning they bloom, by the evening they are gone. But people find it very difficult to be a loving person, a loving soul, so they create a relationship and be fool that way that "Now I am a loving person because I am in a relationship". And the relationship may be just one of monopoly, possessiveness and exclusiveness. The relationship is needed only because love is not there. Relationship is a substitute. Become alert! Relationship destroys love, destroys the very possibility of its birth.
Tuesday, 25 February 2014
On 20:12 by Unknown in CCNA1, CCNA2, CCNA3, CCNA4, packet tracer tutorial, pt tutorial, ssh on packet tracer, telnet and ssh on packet tracer, telnet and ssh on pt, telnet on packet tracer No comments
Hello there, Welcome to our blog. How you all are, Hope you all doing
great. On our blog you will find support for tech, hacking and social
tweaks. We provide networking solutions for any type of problem. You can
contact us through this blog. We will do whatever we can do for your
problem.
Telnet and SSH on packet tracer
A terminal emulation
program for TCP/IP networks such as the Internet. The Telnet program
runs on your computer and connects your PC to a server on the network.
You can then enter commands through the Telnet program and they will be
executed as if you were entering them directly on the server console.
This enables you to control the server and communicate with other
servers on the network. To start a Telnet session, you must log in to a
server by entering a valid username and password. Telnet is a common way
to remotely control Web servers. To telnet means to establish a
connection with the Telnet protocol, either with command line client or
with a programmatic interface.
SSH
Secure Shell (SSH) is a
cryptographic network protocol for secure data communication, remote
shell services or command execution and other secure network services
between two networked computers that connects, via a secure channel over
an insecure network, a server and a client (running SSH server and SSH
client programs, respectively). It was designed as a replacement for
Telnet and other insecure remote shell protocols such as the Berkeley
rsh and rexec protocols, which send information, notably passwords, in
plaintext, rendering them susceptible to interception and disclosure
using packet analysis. The encryption used by SSH is intended to provide
confidentiality and integrity of data over an unsecured network, such
as the Internet.
a
network protocol that ensures a high-level encryption, allowing for the
data transmitted over insecure networks, such as the Internet, to be
kept intact and integrate. SSH and SSH Telnet, in particular, work for
establishing a secure communication between two network-connected
computers as an alternative to remote shells, such as TELNET, that send
sensitive information in an insecure environment.
In contrast to other remote access protocols, such as FTP, SSH Telnet ensures higher level of connection security between distant machines but at the same time represents a potential threat to the server stability. Thus, SSH access is considered a special privilege by hosting providers and is often assigned to users only per request.
In contrast to other remote access protocols, such as FTP, SSH Telnet ensures higher level of connection security between distant machines but at the same time represents a potential threat to the server stability. Thus, SSH access is considered a special privilege by hosting providers and is often assigned to users only per request.
Let us apply Telnet and SSH on packet tracer.
Take the topology as
in the above diagram. Set IPs on the PCs. As, by default, all PCs are in
vlan 1. We will create a virtual interface on switch with vlan 1 as
follows.
Now, we can ping to switch by our hosts because hosts are in vlan 1 and switch also has a vlan 1 interface.
Now, try to telnet the switch from our PC, it refuses because we have not applied authentication on the switch yet.
So, lets apply line authentication on the switch. The
system supports 20 virtual tty (vty) lines for Telnet, Secure Shell
Server (SSH) and FTP services. Each Telnet, SSH, or FTP session requires
one vty line. You can add security to your system by configuring the
software to validate login requests.
Now, we can easily
telnet. But it does not let us go in the switch enabled mode because we
have not set the password on the switch yet.
Lets apply password on the switch enabled mode.
Now, we can go inside Switch configuration mode from our pc.
So, now let us apply SSH on the switch.
Commands continued.
Now, we try to telnet
it but it is refused because ssh has over ruled telnet. So, we will use
SSH protocol on it. By default username is admin.
And we can apply any sort of configuration on our switch from out pc.
Now, if we want to change the username from admin to something else, we will do it as follows.
and from our pc as follows.
The SSH commands are as follows.
Switch(config)#ip domain name ?
WORD Default domain nameSwitch(config)#ip domain name abc.comSwitch(config)#crypto key generate rsa
% Please define a hostname other than Switch.
Switch(config)#hostname s1
s1(config)#ip domain name cs-studys1
s1(config)#crypto key generate rsa
Choose the size of the key modulus in the range of 360 to 2048 for your General Purpose Keys. Choosing a key modulus greater than 512 may take a few minutes.
s1(config)#line vty 0 15 s1(config-line)#transport input ssh
WORD Default domain nameSwitch(config)#ip domain name abc.comSwitch(config)#crypto key generate rsa
% Please define a hostname other than Switch.
Switch(config)#hostname s1
s1(config)#ip domain name cs-studys1
s1(config)#crypto key generate rsa
Choose the size of the key modulus in the range of 360 to 2048 for your General Purpose Keys. Choosing a key modulus greater than 512 may take a few minutes.
s1(config)#line vty 0 15 s1(config-line)#transport input ssh
The name for the keys will be: s1.cs-study
How many bits in the modulus [512]: 1024
% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]
s1(config)#ip ssh version 2
s1(config-line)#
Subscribe to:
Post Comments (Atom)
Search
Popular Posts
-
After studying or while studying, you may to work or you many want to have rather you would like to have some job experience. That will sur...
-
Have you heard about, facebook has overtaken whatsapp. What you think out of it. Hello, there, facebook is using whatsapp. I will be tak...
-
hello folks!, how you are all, this time i'm here to share some queries about OSI and TCP/IP model. Query 1 according to you, Wh...
-
Hello everyone, I'm back with hacking tutorial. This time i'm introducing to you how to hack facebook account using simple text ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and socia...
-
Apple is one of the most chosen products by people. Time by time it had produced such a concepts that has stunned most of us. Here as it...
-
Access Control Lists Introduction Hello everyone. How are you all. This time i'm going to discuss about Access control list with ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and so...
-
Social media is very important part of our life. I mean everyone's life. We can't have our food digest until we don't chat for...
-
Certified Ethical hacking Hello Folks, How ...
Categories
Account Hacking
ACL
Adobe Flash Player
algorithms
Android
APPS AND SOFTWARE
Basic Networking
Bluetooth Hacking
BREAKING NEWS
Bus Tupology
CCNA
ccna discovery
ccna exploration
CCNA Security
CCNA1
CCNA2
CCNA3
CCNA4
Cloud Storage
Credit Card Hacking
Cyber Criminal
Cyber security
DEVELOPERS
Encrypted Password
Encryption
facebook
FTP
FTP Server
GOOGLE GLASS
Google Hacking
hacking tool
internet and network security
Mark Zuckerberg
Media Hacked
NASA
Network Hacking
packet tracer tutorial
Port security
Programming
SOCIAL MEDIA
SOCIAL NETWORKS
Blog Archive
Get Content For Your Website
Get a 150-300 word article written for : $1.50
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
0 comments:
Post a Comment