ssh configuration on cisco router using IPv6

Posted: 19 Apr 2017 in ipv6
Tags: , , ,

Here in this Lab we will learn how to configure ssh on cisco routers using IPv6.This is a Basic IPv6 Configuration Lab showing SSH configuration on router using IPv6 using cisco packet tracer.

ipv6 and ssh

STEP 1:Configure IPv6 address on router and Host PC.

first of all enable unicast-routing over router using ipv6 unicast-routing command and then assign ipv6 address on router interfaces using below command.

 

Router>enable

Router#config t

Enter configuration commands, one per line. End with CNTL/Z.

Router(config)#ipv6 unicast-routing

Router(config)#int fa0/0

Router(config-if)#ipv6 add 2000::1/64

Router(config-if)#no shut

 

 

STEP 2:Configure SSH on Cisco Router using IPv6.

Now i am going to configure ssh over router and the clients can ssh Router through ipv6 address. we will set hostname and domain name on router before ssh configuration.

We will also create a local username and password on router.

Router>enable

Router#config t

Enter configuration commands, one per line. End with CNTL/Z.

Router(config)#hostname linuxtiwary

linuxtiwary(config)#username satish password tiwary

linuxtiwary(config)#ip domain-name wordpress.com

 

 

linuxtiwary(config)#ip ssh version 2

Please create RSA keys (of at least 768 bits size) to enable SSH v2.

Now its time to generate RSA key:

linuxtiwary(config)#crypto key generate rsa

The name for the keys will be: linuxtiwary.wordpress.com

Choose the size of the key modulus in the range of 360 to 2048 for your

General Purpose Keys. Choosing a key modulus greater than 512 may take

a few minutes.

How many bits in the modulus [512]: 2048

% Generating 2048 bit RSA keys, keys will be non-exportable...[OK]

linuxtiwary(config)#ip ssh version 2

*Mar 1 0:3:6.105: %SSH-5-ENABLED: SSH 2 has been enabled

 

Set ssh timeout and maximum authentication retries:

linuxtiwary(config)#ip ssh time-out 60

linuxtiwary(config)#ip ssh authentication-retries 3

create and configure ssh line:

linuxtiwary(config)#line vty 0 4

linuxtiwary(config-line)#login local

linuxtiwary(config-line)#transport input ssh

linuxtiwary(config-line)#exit

 

STEP 3:Check SSH connection from HOST PC.

 

Packet Tracer PC Command Line 1.0

PC>ssh -l 2000::1

Invalid Command.

PC>ssh -l satish 2000::1

Open

Password:

linuxtiwary>
Advertisement

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.