While configuring ssh, take these things into consideration: Here, -l means login which is followed by the username and then the IP address of the device which we want to take remote access. Now, we will try to ssh from Router2 to Router1. Router1(config-line)#crypto key generate rsaĪfter this, it will ask for the size of which you want to generate your key so type 512 or 1024 If this command is not supported type command: Router1(config)#line vty 0 4 The last command “crypto key generate rsa label Cisco modulus 1024” will be executed only if your router supports security features like router 3700.
We have provided a password for vty line login and at last we have created key of 1024 bytes and labelled it as Cisco. Here, note that it is necessary to give domain name as ssh uses it and password for encryption purpose.If domain-name and hostname are not provided then crypro keys will not be generated. Router1(config)#crypto key generate rsa label Cisco modulus 1024 Router1(config-line)password GeeksforGeeks We will ssh Router1 from Router2 Configuring ssh on Router1. In short, SSH is more secure than telnet and has almost replaced telnet. It uses public key for encryption mechanism.It is designed to work in public network.Unlike telnet, it provides authentication methods.SSH is also an application client-server protocol used to take remote access of a device. Either a local database of a device (router) or ACS server can be used for the password for vty lines.īut here we are talking about a simple configuration only. It is mandatory to set a password on vty line while using Telnet or SSH.ĪAA services can also be used to set password on line vty lines. If the device is reachable and you are not able to Telnet, then you have not set a password on vty line.