Open In App

How to Configure User Authentication?

Last Updated : 26 Apr, 2024
Improve
Improve
Like Article
Like
Save
Share
Report

User authentication authorizes a human-to-machine transfer of credentials during network interactions to verify a user’s authenticity. This process checks the identification of a user trying to access a network or computational resource. We are going to perform user authentication on SSH by providing different usernames with their respective passwords. SSH stands for Secure Shell, a cryptographic network protocol for operating network services securely over an unsecured network. It is used for remote login and remote CLI access.

Consider the topology: In this topology we have 3 PCs connected to a switch and that switch is connected to a router in such a manner that is given below;

 

R1’s configuration: Go to Router 1 and do the following configuration

 int g0/0/0
ip add 192.168.1.1 255.255.255.0
no shutdown
enable password cisco
ip domain-name R1
crypto key generate rsa
line vty 0 4
transport input ssh
login local
exi
t
username jake password Cisco
username mike password CCNA
username guey password CCNP

PC4 configuration: Go to PC4 and do the following configuration

 

PC5 configuration: Go to PC5 and do the following configuration

 

PC6 configuration: Go to PC6 and do the following configuration

 

SSH on R1 using PC4:

ssh -l jake 192.168.1.1

 

Checking the changes on R1:

 

As you can see, the hostname of R1 has changed to R2.

Simulation:


Like Article
Suggest improvement
Share your thoughts in the comments

Similar Reads