Open In App

How to Configure User Authentication?

Last Updated : 07 Jan, 2023
Improve
Improve
Like Article
Like
Save
Share
Report

User authentication authorizes a human-to-machine transfer of credentials during network interactions to verify a user’s authenticity. This process checks the identification of a user trying to access a network or computational resource. We are going to perform user authentication on SSH by providing different usernames with their respective passwords. SSH stands for Secure Shell, a cryptographic network protocol for operating network services securely over an unsecured network. It is used for remote login and remote CLI access.

Consider the topology: In this topology we have 3 PCs connected to a switch and that switch is connected to a router in such a manner that is given below;

 

R1’s configuration: Go to Router 1 and do the following configuration

 int g0/0/0
  ip add 192.168.1.1 255.255.255.0
  no shutdown
 enable password cisco
 ip domain-name R1
 crypto key generate rsa 
 line vty 0 4
 transport input ssh 
 login local 
 exi
t
 username jake password Cisco
 username mike password CCNA
 username guey password CCNP

PC4 configuration: Go to PC4 and do the following configuration

 

PC5 configuration: Go to PC5 and do the following configuration

 

PC6 configuration: Go to PC6 and do the following configuration

 

SSH on R1 using PC4:

ssh -l jake 192.168.1.1

 

Checking the changes on R1:

 

As you can see, the hostname of R1 has changed to R2.

Simulation:

 


Like Article
Suggest improvement
Share your thoughts in the comments

Similar Reads