How to Configure User Authentication?
User authentication authorizes a human-to-machine transfer of credentials during network interactions to verify a user’s authenticity. This process checks the identification of a user trying to access a network or computational resource. We are going to perform user authentication on SSH by providing different usernames with their respective passwords. SSH stands for Secure Shell, a cryptographic network protocol for operating network services securely over an unsecured network. It is used for remote login and remote CLI access.
Consider the topology: In this topology we have 3 PCs connected to a switch and that switch is connected to a router in such a manner that is given below;
R1’s configuration: Go to Router 1 and do the following configuration
int g0/0/0
ip add 192.168.1.1 255.255.255.0
no shutdown
enable password cisco
ip domain-name R1
crypto key generate rsa
line vty 0 4
transport input ssh
login local
exi
t
username jake password Cisco
username mike password CCNA
username guey password CCNP
PC4 configuration: Go to PC4 and do the following configuration
PC5 configuration: Go to PC5 and do the following configuration
PC6 configuration: Go to PC6 and do the following configuration
SSH on R1 using PC4:
ssh -l jake 192.168.1.1
Checking the changes on R1:
As you can see, the hostname of R1 has changed to R2.