List nic
- show interfaces description
Gi0/0 up up
Gi0/1 admin down down
Gi0/2 admin down down
Lo0 up up
Configure vIOS routers as following.
Router>en
Router#conf t
Router(config)#hostname vOS-I
vIOS-I(config)#interface GigabitEthernet 0/0
vIOS-I(config-if)#ip address 172.16.1.1 255.255.255.0
vIOS-I(config-if)#no shutdown
vIOS-I(config-if)#do wr
List Routing Table
Router2#show ip route
Default GW Router(config)#ip route 0.0.0.0 0.0.0.0 192.168.1.6
Enable SSh @ router
http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/1100-cisco-routers-ssh-support-configuration-rsa-key-generation.html
Router (config)# username admin privilege 15 secret Firewall.cx (Firewall.cx <- nbsp="" password="" ssh="" strong="" to="">
Router (config)# aaa new-model
Router (config)# aaa authentication login default local
Router (config)# enable secret $FirewAll.cx! <- en="" mode="" nbsp="" password="" strong="" to="">
Router (config)# service password-encryption->->
Router (config)# aaa new-model
Router (config)# aaa authentication login default local
Router (config)# enable secret $FirewAll.cx! <- en="" mode="" nbsp="" password="" strong="" to="">
Router (config)# service password-encryption->->
R1(config)# line vty 0 4
R1(config-line)# transport input ssh
R1(config-line)# login authentication default
R1(config-line)# password $Cisco! <- aaa="" authentication="" cisco="" guna="" nbsp="" ni="" pakai="" password="" sebab="" strong="" tak="">->
R1(config-line)# transport input ssh
R1(config-line)# login authentication default
R1(config-line)# password $Cisco! <- aaa="" authentication="" cisco="" guna="" nbsp="" ni="" pakai="" password="" sebab="" strong="" tak="">->
Generating RSA key (selagi takde key, ssh port tak enable)
R1 (config)# ip domain-name firewall.cx
R1(config)# crypto key generate rsa
The name for the keys will be: R1.firewall.cx
Choose the size of the key modulus in the range of 360 to 4096 for your General Purpose Keys. Choosing a key modulus greater than 512 may take a few minutes. How many bits in the modulus [512]: 4096
% Generating 4096 bit RSA keys, keys will be non-exportable...
[OK] (elapsed time was 183 seconds)
R1(config)# crypto key generate rsa
The name for the keys will be: R1.firewall.cx
Choose the size of the key modulus in the range of 360 to 4096 for your General Purpose Keys. Choosing a key modulus greater than 512 may take a few minutes. How many bits in the modulus [512]: 4096
% Generating 4096 bit RSA keys, keys will be non-exportable...
[OK] (elapsed time was 183 seconds)
Remove ospf process:
R1(conf)# no router ospf 1
No comments:
Post a Comment
Terima kasih