4.8 Remote Access using SSH Flashcards
Configure network devices for remote access using SSH. (21 cards)
What is the protocol that provides secure remote terminal access?
SSH
Secure Shell (SSH) is designed for secure, encrypted remote access to devices, unlike Telnet, which is unencrypted.
Fill in the Blank:
SSH ensures secure communication by ______ data during transmission.
encrypting
SSH uses encryption algorithms to protect sensitive data such as usernames, passwords, and session details from unauthorized access.
What types of data does SSH encrypt during a session?
Both usernames and passwords.
SSH provides comprehensive encryption for all transmitted data, safeguarding both usernames and passwords from potential eavesdroppers.
List three primary functions of SSH.
- Transferring files securely
- Executing commands remotely
- Establishing secure connections between systems
SSH is versatile, allowing for secure file transfers and remote command execution, enhancing system security.
What port does SSH use for communication?
22
SSH communicates over port 22, while Telnet operates on port 23.
What are the advantages of using SSH over Telnet?
- Encryption of all data.
- Stronger authentication.
- Prevention of data interception.
SSH ensures confidentiality, integrity, and secure access compared to Telnet, which is vulnerable to man-in-the-middle attacks due to lack of encryption.
List the steps required to configure SSH on a Cisco device.
- Set the hostname.
- Set the domain name.
- Generate RSA keys.
- Create user authentication.
- Enable SSH on VTY lines.
These steps establish a secure SSH configuration on Cisco devices, ensuring encrypted remote access and management.
Define:
RSA key pair
A public and private key used for encryption.
In SSH, the RSA key pair facilitates secure data transmission by encrypting and decrypting information between the client and server, ensuring confidentiality and integrity during remote sessions.
True or False:
SSH version 1 is preferred for secure remote access.
False
SSH version 2 is preferred because it provides better encryption and security features compared to SSH version 1, which has known vulnerabilities.
What command is used to enable SSH version 2 on a Cisco device?
ip ssh version 2
This command enables SSH version 2, which is more secure than version 1 and supports stronger encryption methods.
What happens when SSH is configured on a device?
RSA keys are generated, enabling encrypted access.
The device creates public and private keys to establish a secure connection. These keys allow encrypted communication, ensuring data protection during remote access.
Define:
VTY lines
Virtual terminal lines for remote access.
VTY lines allow remote devices to access the Cisco device’s CLI. When configured for SSH, they allow encrypted, secure connections.
Why should Telnet be disabled when using SSH?
Becuase telnet transmits data in plaintext.
Since Telnet does not provide encryption, it exposes sensitive data, such as login credentials, to potential interception. SSH, in contrast, provides strong encryption.
Fill in the blank:
The command to disable Telnet and enable SSH is ‘______ ______ ______’.
transport input ssh
This command disables Telnet, ensuring that remote access is only allowed through the secure SSH protocol.
True or False:
A domain name must be set before enabling SSH on a Cisco device.
True
The domain name is necessary for the creation of the RSA key pair, which is a prerequisite for enabling SSH on Cisco devices.
What does the command ‘transport input ssh’ do on VTY lines?
It restricts access to SSH only.
This command ensures that only secure SSH connections are allowed on the VTY lines, preventing unencrypted Telnet access.
What is SSH key exchange?
The process of exchanging cryptographic keys for encryption.
SSH key exchange involves securely exchanging public keys between the client and server to establish a secure, encrypted communication channel, protecting data from potential interception.
True or False:
SSH can be configured without creating a user account.
False
A user account must be configured to authenticate SSH connections. Without a username and password, access to the device is not possible via SSH.
What command sets the SSH timeout interval on a Cisco device?
exec-timeout [minutes] [seconds]
This command specifies the timeout interval for SSH sessions, enhancing security by limiting session durations.
How can you verify the SSH configuration on a Cisco device?
show ip ssh
This command displays the current SSH configuration and status, allowing verification of settings.
Fill in the blank:
To disable SSH on a Cisco device, use the command ______ ______ ______.
no ip ssh
This command disables SSH on the device, reverting to other remote access methods like Telnet if configured.