Uploaded by Muskan Shaikh

322078 Muskan Shaikh 3

advertisement
Name: Muskan Salim Shaikh
Roll No: 322078
PRN: 22220287
Batch: B3
Assignment no 3
Title: Configure Secure Passwords and SSH using Packet Tracer
Aim The aim of this assignment is to familiarize students with the process of
configuring secure passwords and SSH (Secure Shell) on network devices using
Packet Tracer. Students will learn the importance of securing network
infrastructure and the methods to ensure that only authorized personnel can
access network devices.
Objective : Understand the significance of securing passwords and remote
access to network devices. Learn to configure strong and secure passwords on
network devices. Implement SSH to establish secure remote access to devices.
Gain practical experience in Packet Tracer to configure and test these security
measures.
Theory: In a network environment, securing passwords and enabling secure
remote access are crucial aspects of maintaining the integrity and
confidentiality of the network. Weak or poorly configured passwords can leave
network devices vulnerable to unauthorized access, potentially leading to
security breaches.
 Secure passwords: Password complexity and length: Configure strong
passwords with a combination of uppercase and lowercase letters,
numbers, and special characters. Set a minimum password length.
 Password aging: Implement policies for password expiration and
renewal.
 Account lockout policies: Set rules for account lockout after multiple
failed login attempts to prevent brute force attacks.
 Password encryption: Ensure that passwords are stored in an encrypted
format in the device's configuration.
 SSH (Secure Shell):SSH is a cryptographic network protocol used for
secure remote access to network devices. It provides secure, encrypted
communication between the client and the server.
Implementation details and Screenshots:
Address Table:
Device
RTA
PCA
SW1
Interface
G 0/0
NIC
VLAN 1
IP Address Subnet Mask Default Gateway
172.16.1.1 255.255.255.0
N/A
172.16.1.10 255.255.255.0
172.16.1.1
172.16.1.2 255.255.255.0
172.16.1.1
Conclusion:
In conclusion, this assignment offers hands-on experience in configuring secure
passwords and SSH via Packet Tracer. By implementing best practices for
password security, students learn to bolster network infrastructure security,
allowing only authorized user access. This knowledge is crucial for network
administrators and IT professionals entrusted with maintaining secure and
dependable network environments
*****************************
Download