Cisco WS-C2950T-24 Hardware Installation Guide - Page 147

Examples, What to Do Next, Configuring the Auxiliary Line

Page 147 highlights

Chapter 4 Configuring the Router Performing the Initial Configuration on the Router Step 4 Command or Action password password Purpose Specifies a password on a line. Step 5 Example: Router(config-line)# password guessagain login Step 6 Example: Router(config-line)# login end Enables password checking at login. Returns to privileged EXEC mode. Step 7 Step 8 Example: Router(config-line)# end show running-config Displays the running configuration file. Example: Router# show running-config • Verify that you properly configured the virtual terminal lines for remote access. From another network device, attempt to open a Telnet Verifies that you can remotely access the router and that the session to the router. virtual terminal line password is correctly configured. Example: Router# 172.16.74.3 Password: Examples What to Do Next The following example shows how to configure virtual terminal lines with a password: ! line vty 0 4 password guessagain login ! After you configure the vty lines, follow these steps: • (Optional) To encrypt the virtual terminal line password, see the "Configuring Passwords and Privileges" chapter in the Cisco IOS Security Configuration Guide. Also see the Cisco IOS Password Encryption Facts tech note. • (Optional) To secure the VTY lines with an access list, see the "Part 3: Traffic Filtering and Firewalls" in the Cisco IOS Security Configuration Guide. Configuring the Auxiliary Line This section describes how to enter line configuration mode for the auxiliary line. How you configure the auxiliary line depends on your particular implementation of the auxiliary (AUX) port. See the following documents for information on configuring the auxiliary line: OL-18712-01 Cisco 2900 and 3900 Series Hardware Installation 4-19

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220

4-19
Cisco 2900 and 3900 Series Hardware Installation
OL-18712-01
Chapter 4
Configuring the Router
Performing the Initial Configuration on the Router
Examples
The following example shows how to configure virtual terminal lines with a password:
!
line vty 0 4
password guessagain
login
!
What to Do Next
After you configure the vty lines, follow these steps:
(Optional) To encrypt the virtual terminal line password, see the “Configuring Passwords and
Privileges” chapter in the
Cisco IOS Security Configuration Guide
. Also see the
Cisco IOS Password
Encryption Facts
tech note.
(Optional) To secure the VTY lines with an access list, see the “Part 3: Traffic Filtering and
Firewalls” in the
Cisco IOS Security Configuration Guide
.
Configuring the Auxiliary Line
This section describes how to enter line configuration mode for the auxiliary line. How you configure
the auxiliary line depends on your particular implementation of the auxiliary (AUX) port. See the
following documents for information on configuring the auxiliary line:
Step 4
password
password
Example:
Router(config-line)# password
guessagain
Specifies a password on a line.
Step 5
login
Example:
Router(config-line)# login
Enables password checking at login.
Step 6
end
Example:
Router(config-line)# end
Returns to privileged EXEC mode.
Step 7
show running-config
Example:
Router# show running-config
Displays the running configuration file.
Verify that you properly configured the virtual terminal
lines for remote access.
Step 8
From another network device, attempt to open a Telnet
session to the router.
Example:
Router# 172.16.74.3
Password:
Verifies that you can remotely access the router and that the
virtual terminal line password is correctly configured.
Command or Action
Purpose