Lab 8.3.1.2 Configure Basic AP Security Through IOS CLI: Objective
Lab 8.3.1.2 Configure Basic AP Security Through IOS CLI: Objective
Objective
In this lab, the student will learn the following objectives: Password protect the console Define administrator accounts Configure accurate time and check firmware Configure SSH o o Limit VTY to SSH Access-list to secure SSH
Scenario
Students will learn to secure the AP through Cisco Internetworking Operating System (IOS). The security policy of the company mandates all devices should be locked down according to minimum standards. Also, SSH must be used for remote management. SSH is a program, similar to Telnet, which allows a network administrator to log into another computer over a network. SSH allows an administrator to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure networks. There are currently two versions of SSH available, SSH Version 1 and SSH Version 2. Only SSH Version 1 is implemented in the Cisco IOS software.
1 - 10
Topology
Preparation
Team 1 2 AP Name Pod1 Pod2 SSID AP1 AP2 Address 10.0.1.1/24 10.0.2.1/24
The instructor should have a working wired network. PC1 should be connected to the wired network. Prior to starting the lab, ensure that each host PC is loaded with a SSH client. There are numerous SSH clients available for free on the Internet. The lab was developed using the PuTTY SSH client.
Additional Materials
http://www.cisco.com/en/US/products/hw/wireless/ps430/products_installation_and_configuration_gu ide_book09186a0080147d69.html http://www.chiark.greenend.org.uk/~sgtatham/putty/
2 - 10
Command List
In this lab exercise, the following commands will be used. Refer to this list if assistance or help is needed during the lab exercise. Command
crypto key generate rsa hostname ip domain-name ip ssh transport input
Description
Generates Rivest, Shamir, and Adleman (RSA) key pairs. This command changes the APs hostname. Defines a default domain name that the Cisco IOS software uses to complete unqualified host names. Use the ip ssh command to configure Secure Shell (SSH) control parameters on the AP. Defines which protocols to use to connect to a specific line of the AP.
g. Remain on PC1 to configure the following steps. h. While in configuration mode, check the configuration PodP(config)#do show run
3 - 10
c.
Also, it is important to encrypt the passwords in the configurations if there are multiple administrator accounts with various privilege levels. By default, this is enabled on the AP 1200. PodP(config)#service password-encryption
d. While in configuration mode, verify the user accounts and password encryption. PodP(config)#do show run e. Secure the console connection by requiring a password. PodP(config)#line con 0 PodP(config-line)#login PodP(config-line)#password cIsCo123 f. Exit out of the AP and log back in. User Access Verification Password: g. A more secure method is to require a username and password combination. Return to configuration mode and configure local authentication on the console. PodP(config)#line con 0 PodP(config-line)#login local h. Exit out of the AP and log back in using the username password combination configured in step 2a. User Access Verification Username: Password: PodP>
4 - 10
c.
(Optional) Configure daylight savings time. Use the help feature or command reference if needed. PodP(config)#clock summer-time
d. Check the clock settings while in configuration mode. PodP(config)#do show clock
_______________________________________________________________
d. Does this AP have any known vulnerabilities?
Generate RSA keys (continued) To enable SSH for local and remote authentication on the AP, enter the command crypto key generate rsa and press Enter. The AP will respond with a message showing the naming convention for the keys. c. What is the default size, in bits, of the key modulus?
6 - 10
7 - 10
b. In the Host Name (or IP address) input box enter the IP address of the pod AP. Next, change the protocol to SSH. These two values must be sent to establish the SSH. To test the connection, press the Open command button at the bottom of the window. c. The SSH client will prompt for the local username and password that was previously set on the Pod AP. Enter the cIsCo123 for the username and cIsCo123 for the password.
d. Was the SSH connection successful? If so, how is the prompt displayed?
SSH1: starting SSH control process SSH1: sent protocol version id SSH-1.5-Cisco-1.25 SSH1: protocol version id is - SSH-1.5-PuTTY-Release-0.53b SSH1: SSH_SMSG_PUBLIC_KEY msg SSH1: SSH_CMSG_SESSION_KEY msg - length 112, type 0x03 SSH: RSA decrypt started SSH: RSA decrypt finished SSH: RSA decrypt started SSH: RSA decrypt finished SSH1: sending encryption confirmation SSH1: keys exchanged and encryption on SSH1: SSH_CMSG_USER message received SSH1: authentication request for userid cisco SSH1: SSH_SMSG_FAILURE message sent SSH1: SSH_CMSG_AUTH_PASSWORD message received SSH1: authentication successful for cisco SSH1: requesting TTY
Copyright 2003, Cisco Systems, Inc.
03:45:44: SSH1: setting TTY - requested: length 24, width 80; set: length 24, width 80 03:45:44: SSH1: SSH_CMSG_EXEC_SHELL message received 03:45:44: SSH1: starting shell for vty03:45:37: SSH1: starting SSH control process d. To get an idea of the debugging process and the debugging message, open another instance of the SSH client and intentionally enter the wrong username or password. View the debugging output for failed authentication. Disable debugging PodP#undebug all All possible debugging has been turned off e. Viewing SSH sessions f. Use the show ssh command to view the active SSH sessions.
g. Fill in the appropriate values of the table below, based on the output of the show ssh command. Connection Version Encryption State Username
Viewing SSH parameters h. To display the version information and SSH parameters, use the show ip ssh command. i. Is the output displayed exactly as the output below? If not, what are the differences?
PodP>sh ip ssh SSH Enabled - version 1.5 Authentication timeout: 15 secs; Authentication retries: 3
d. Was the Telnet connection successful? Why or why not? Enter SSH parameters. e. Enter the following commands to establish a SSH connection to the peer AP: PodP#ssh ? f. What are the additional arguments of the ssh command?
g. What encryption algorithms are available? Establish AP to AP SSH connection. h. Enter the following command to establish a SSH connection to the peer AP: PodP>ssh c des l cisco 10.0.Q.1 (where Q is the peer team AP)
This command makes a SSH connection to a peer AP with an address of 10.0.Q.2, DES as the encryption, and cisco as the login username. i. Was the SSH connection successful? Verify SSH. j. Enter the following command to verify the SSH connection: PodP#show ip ssh PodP#show ssh k. What other commands could be useful to verify and troubleshoot SSH connections?
c.
If the configuration was saved to flash, erase the startup configuration and reload the AP. PodP#erase startup-config PodP#reload
10 - 10