4.8 Remote Access using SSH Flashcards

Configure network devices for remote access using SSH. (21 cards)

1
Q

What is the protocol that provides secure remote terminal access?

A

SSH

Secure Shell (SSH) is designed for secure, encrypted remote access to devices, unlike Telnet, which is unencrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Fill in the Blank:

SSH ensures secure communication by ______ data during transmission.

A

encrypting

SSH uses encryption algorithms to protect sensitive data such as usernames, passwords, and session details from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What types of data does SSH encrypt during a session?

A

Both usernames and passwords.

SSH provides comprehensive encryption for all transmitted data, safeguarding both usernames and passwords from potential eavesdroppers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List three primary functions of SSH.

A
  1. Transferring files securely
  2. Executing commands remotely
  3. Establishing secure connections between systems

SSH is versatile, allowing for secure file transfers and remote command execution, enhancing system security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What port does SSH use for communication?

A

22

SSH communicates over port 22, while Telnet operates on port 23.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the advantages of using SSH over Telnet?

A
  1. Encryption of all data.
  2. Stronger authentication.
  3. Prevention of data interception.

SSH ensures confidentiality, integrity, and secure access compared to Telnet, which is vulnerable to man-in-the-middle attacks due to lack of encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List the steps required to configure SSH on a Cisco device.

A
  1. Set the hostname.
  2. Set the domain name.
  3. Generate RSA keys.
  4. Create user authentication.
  5. Enable SSH on VTY lines.

These steps establish a secure SSH configuration on Cisco devices, ensuring encrypted remote access and management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define:

RSA key pair

A

A public and private key used for encryption.

In SSH, the RSA key pair facilitates secure data transmission by encrypting and decrypting information between the client and server, ensuring confidentiality and integrity during remote sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False:

SSH version 1 is preferred for secure remote access.

A

False

SSH version 2 is preferred because it provides better encryption and security features compared to SSH version 1, which has known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What command is used to enable SSH version 2 on a Cisco device?

A

ip ssh version 2

This command enables SSH version 2, which is more secure than version 1 and supports stronger encryption methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What happens when SSH is configured on a device?

A

RSA keys are generated, enabling encrypted access.

The device creates public and private keys to establish a secure connection. These keys allow encrypted communication, ensuring data protection during remote access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define:

VTY lines

A

Virtual terminal lines for remote access.

VTY lines allow remote devices to access the Cisco device’s CLI. When configured for SSH, they allow encrypted, secure connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why should Telnet be disabled when using SSH?

A

Becuase telnet transmits data in plaintext.

Since Telnet does not provide encryption, it exposes sensitive data, such as login credentials, to potential interception. SSH, in contrast, provides strong encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fill in the blank:

The command to disable Telnet and enable SSH is ‘______ ______ ______’.

A

transport input ssh

This command disables Telnet, ensuring that remote access is only allowed through the secure SSH protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False:

A domain name must be set before enabling SSH on a Cisco device.

A

True

The domain name is necessary for the creation of the RSA key pair, which is a prerequisite for enabling SSH on Cisco devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the command ‘transport input ssh’ do on VTY lines?

A

It restricts access to SSH only.

This command ensures that only secure SSH connections are allowed on the VTY lines, preventing unencrypted Telnet access.

17
Q

What is SSH key exchange?

A

The process of exchanging cryptographic keys for encryption.

SSH key exchange involves securely exchanging public keys between the client and server to establish a secure, encrypted communication channel, protecting data from potential interception.

18
Q

True or False:

SSH can be configured without creating a user account.

A

False

A user account must be configured to authenticate SSH connections. Without a username and password, access to the device is not possible via SSH.

19
Q

What command sets the SSH timeout interval on a Cisco device?

A

exec-timeout [minutes] [seconds]

This command specifies the timeout interval for SSH sessions, enhancing security by limiting session durations.

20
Q

How can you verify the SSH configuration on a Cisco device?

A

show ip ssh

This command displays the current SSH configuration and status, allowing verification of settings.

21
Q

Fill in the blank:

To disable SSH on a Cisco device, use the command ______ ______ ______.

A

no ip ssh

This command disables SSH on the device, reverting to other remote access methods like Telnet if configured.