Short and complete guide to configure SSH on Cisco router and switch for secure remote connection. The Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best-known example application is for remote login to computer systems by users.
Set Ssh Port Used
SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.
Change 7822 to the new port number that you want to use. Save the changes to the /etc/ssh/sshdconfig file, and then exit the text editor. Restart the SSH service using the appropriate command for your Linux distribution: For CentOS and Fedora, type: service sshd restart For Debian and Ubuntu, type: service ssh. Go to System Settings Administrator Settings and change the HTTPS and SSH ports. You can change the default port configurations for HTTPS and SSH administrative access for added security. To connect to a non-standard port, the new port number must be included in the collection request. As you can see, the default port shows 22 here and the type of connection is TCP. Let’s change the port to 2020. Editing the sshdconfig File. To change the default port our ssh service is active on, we’ll edit the ssh server configuration file. The /etc/ssh/sshdconfig file holds the default configuration data for the ssh server. Once you complete the above steps successfully, finalize the settings and mop up, so use the new port rather than the. Configure the ssh daemon, open /etc/ssh/sshdconfig delete/comment out the Port 22 in it. Now you have told sshd not to listen on port 22.
Set Ssh Port
The typical use of SSH Protocol
The protocol is used in corporate networks for:
- providing secure access for users and automated processes
- interactive and automated file transfers
- issuing remote commands
- managing network infrastructure and other mission-critical system components.
Configure SSH on Cisco Router or Switch
To configure SSH on Cisco router, you need to do:
- Enable SSH on Cisco router.
- Set Password for SSH.
- Force remote access to use SSH.
- Enable Password Encryption.
- Add domain name Server (DNS).
- Add Username and Password.
Let’s enable and configure SSH on Cisco router or switch using the below packet tracer lab. The configure on a packet tracer lab and real Cisco devices are the same. Just try to learn and do it what the SSH remote authentication needs.
Download the packet tracer lab or create your own lab. SSH Configuration Packet Tracer Lab.
In this example, I just enable and configure SSH on SW1 and trying to access it from PC1. It’s enough to learn how to configure SSH on Cisco router.
That’s all. Let’s check the process one by one.
Ssh How To Specify Port
- I have set DNS domain name with “IP domain-name” command.
- Then configure the router to use RSA key pair with modulus size of 1024 bites for remote service authentication with “crypto key generate rsa” command.
- Add username “Admin” with Password of “Technig” for ssh authentication.
- Enabled ssh with “line vty 0 4” command.
- Configure ssh to use local username and password with “login local” command. Remember that you can set a username and password for ssh with “username Admin password Technig” command as well. But here we configure ssh to use local username and password.
- Configure the router to accept only ssh connection with “transport input ssh” command.
- Configure ssh to version 2 using “IP ssh version 2” and set the authentication times to 3 with “IP ssh authentication-retries 3” command.
- Finally set the ssh timeout to 120 seconds with “IP ssh time-out 120” command.
Linux Set Ssh Port
Zbrush os x download. Related Article:Install SSH on CentOS 8.x and Red Hat Linux
Set Ssh Port Ubuntu
The final step is to test the connectivity of ssh from PC1 with “ssh -l Admin 192.168.1.1” command for command prompt.
OK, the ssh works perfectly.