I am not a Cisco guy. This usage journal is a personal reference for my security lab work. Please research whether this makes sense for your environment. Do not take these paragraphs as security recommendations, or as a guideline to setup a production environment.
- Cisco - network device commands usage journal for the security lab
Cisco - network device commands usage journal for the security lab
Set a basic device password and a user-mode password
Connect via serial or cross-over cable. From pre-user mode press Enter.
enable config t configure terminal enable password 123cisco enable secret cisco123password show running-config | include enable password
Check for the
enable secret line. Make sure the lines don’t contain the password.
Set a router hostname
You want a naming convention.
enable config t hostname coolrouter banner #This router is 0wned by because-security. Tel: 12345678909, [email protected]# exit
config terminal interface fastethernet 0/0 ip address 10.0.0.1 255.255.255.0 show interface fastethernet 0/0
10.0.0.1/24 in this case… the
administratively down. Also
line protocol is also down.
administratively downmeans it’s shut down due to config
downmeans there is something missing
upmeans we have PHY
interface fastethernet 0/0
changed state to up.
line proto should be up.
speed are on auto by default.
show interface fastethernet 0/0
It’s up. Cool.
enable config t ip domain-name labrouter.local username wishi password securePassword crypto key generate rsa general-keys modulus 1024 ip ssh version 2 line vty 0 4 login local transport input ssh exit exit running-config startup-config