In normal work and maintenance, we often use common remote connection methods such as Telnet or SSL. Today I want to write about the configuration and verification of Telnet.
Telnet is a method of remote device access through IP networks. You need to understand its basic concepts first. It can perform three verification methods: password-free verification, password verification, local username and password verification. Its port is TCP/23 port.
Next we configure Telnet:
The network topology is as shown in the figure below
1. First set the PC The IP address is 192.168.100.1/24, set as shown below
2. Configure the IP address of the port connected to the network on the router
[RT1]int g0/0/0
[RT1-GigabitEthernet0/0/0]ip add 192.168.100.254 24
3. Enable the Telnet server function on the device
[RT1]telnet server enable
% Start Telnet server
4. Enter the vty view and set the authentication method
[RT1]user-interface vty 0 4
[RT1-ui-vty0-4]authentication-mode ?
none Login without checking //No verification required
password Authentication use password of user terminal interface / /Password authentication
scheme Authentication use AAA //Local user authentication
////[RT1-ui-vty0-4]set authentication password simple? (If you use password authentication, go here Set password)
////STRING Plain text password
////[RT1-ui-vty0-4]user privilege level? (If using password verification Set the user login level here)
//// INTEGER Specify privilege level
Note: The user login level range is 0-3 four levels
User level | Allowed command levels |
0 | Access level |
1 | Access level, monitoring level |
2 | Access level, monitoring level, system level |
3 | Access level, monitoring level, system level, management level |
5. Create local users, Configure password, set service type, set user level
[RT1]local-user dgc
New local user added.
[RT1-luser-dgc] password simple 123456
[RT1-luser-dgc]service-type telnet
[RT1-luser-dgc]authorization-attribute level 3
[RT1-luser-dgc ]
6. Verification
Telnet router on the PC, the IP is 192.168.100.254
Being able to enter the RT device indicates that the experiment was successful .
The above is the detailed content of How to configure and verify network equipment Telnet. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 Linux new version
SublimeText3 Linux latest version

Dreamweaver CS6
Visual web development tools

Dreamweaver Mac version
Visual web development tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft
