CertExams.com Simulator Lab Exercises Answers

Configuring the network devices for remote access using SSH.

Description: Lab exercise explains the concept of how to enable SSH.

Telnet was the protocol which Network Administrators were using for accessing the CLI console of a server or a network device remotely. Telnet is an insecure protocol for remote server configuration. SSH replaced telnet and SSH is much more secure than telnet. SSH supports authentication, confidentiality and integrity for remote administration. Telnet is used only as network testing tool like ping or netstat these days. Network administrators must disable telnet and use only SSH wherever possible.

SSH (Secure Shell) is a protocol which define how to connect securely over a network. SSH (Secure Shell) protocol provides the three main ideas of security authentication, confidentiality (via encryption) and integrity of data transfer over a network.

SSH supports Authentication to reliably determine the identity of the connecting computer, encryption to scramble data so that only the intended recipient only can read it and Integrity to guarantees the data sent over the network is not changed by a third party.


1. Configure device authentication

2. Configure the encryption key method.

3. Configure a local database username. Using username command create a user id with the highest possible privilege level and a secret password.

4. Enable SSH on the VTY lines.

 Please refer to the CertExams.com Network Simulator software for complete lab with commands. 

CertExams Blog!  Certexams.com Facebook Page Certexams.com Twitter Page Certexams on YouTube