start:cursos:cisco
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| start:cursos:cisco [2026/03/31 12:17] – [IPv6] 192.168.10.1 | start:cursos:cisco [2026/03/31 14:43] (current) – [Niveles de acceso privilegiado] 192.168.10.1 | ||
|---|---|---|---|
| Line 1331: | Line 1331: | ||
| De esta forma, ya no se muestra ninguna contraseña en claro. | De esta forma, ya no se muestra ninguna contraseña en claro. | ||
| + | ==== Usuarios ==== | ||
| + | Lo visto hasta ahora era seguridad a nivel de línea, donde todos los administradores usan la misma contraseña, | ||
| + | |||
| + | ``` | ||
| + | R1(config)# | ||
| + | R1(config)# | ||
| + | R1(config)# | ||
| + | R1(config-line)# | ||
| + | R1(config)# | ||
| + | R1(config-line)# | ||
| + | ``` | ||
| + | |||
| + | De eesta forma, usando `login local` en las líneas, ahora forzamos a que se usen usuarios | ||
| + | |||
| + | ``` | ||
| + | C: | ||
| + | Trying 10.0.0.1 ...Open | ||
| + | User Access Verification | ||
| + | Username: admin1 | ||
| + | Password: < | ||
| + | R1> | ||
| + | ``` | ||
| + | |||
| + | ==== Niveles de acceso privilegiado ==== | ||
| + | |||
| + | Hay 16 niveles de acceso privilegiado, | ||
| + | |||
| + | Por defecto, hay 3 niveles: 0 (que apenas tiene 5 comandos: `logout`, `enable`, `disable`, | ||
| + | `help`, y `exit`); el 1, que es el de usuario, y el 15, que es el de administrador. | ||
| + | |||
| + | |||
| + | ``` | ||
| + | R1(config)# | ||
| + | R1(config)# | ||
| + | R1(config)# | ||
| + | R1(config)# | ||
| + | R1(config-line)# | ||
| + | R1(config)# | ||
| + | R1(config-line)# | ||
| + | ``` | ||
| + | |||
| + | |||
| + | ``` | ||
| + | C: | ||
| + | Trying 10.0.0.1 ...Open | ||
| + | User Access Verification | ||
| + | Username: admin1 | ||
| + | Password: < | ||
| + | R1> | ||
| + | R1>show privilege | ||
| + | Current privilege level is 1 | ||
| + | |||
| + | R1>show ip interface brief | ||
| + | Interface IP-Address OK? Method Status Protocol | ||
| + | GigabitEthernet0/ | ||
| + | GigabitEthernet0/ | ||
| + | GigabitEthernet0/ | ||
| + | Vlan1 unassigned YES unset administratively down down | ||
| + | R1>show run | ||
| + | ^ | ||
| + | % Invalid input detected at ' | ||
| + | |||
| + | ``` | ||
| + | |||
| + | ``` | ||
| + | C: | ||
| + | Trying 10.0.0.1 ...Open | ||
| + | User Access Verification | ||
| + | Username: admin3 | ||
| + | Password: < | ||
| + | R1>show ip interface brief | ||
| + | Interface IP-Address OK? Method Status Protocol | ||
| + | GigabitEthernet0/ | ||
| + | GigabitEthernet0/ | ||
| + | GigabitEthernet0/ | ||
| + | Vlan1 unassigned YES unset administratively down down | ||
| + | R1>show run | ||
| + | ^ | ||
| + | % Invalid input detected at ' | ||
| + | |||
| + | ``` | ||
| + | |||
| + | |||
| + | |||
| + | ``` | ||
| + | C: | ||
| + | Trying 10.0.0.1 ...Open | ||
| + | User Access Verification | ||
| + | Username: admin2 | ||
| + | Password: < | ||
| + | R1# | ||
| + | R1#show privilege | ||
| + | Current privilege level is 15 | ||
| + | |||
| + | R1#sh run | ||
| + | Building configuration... | ||
| + | Current configuration : 1380 bytes | ||
| + | version 15.1 | ||
| + | ! | ||
| + | R1# | ||
| + | R1(config)# | ||
| + | ``` | ||
| + | |||
| + | Si añadimos un privilegio al nivel 5: | ||
| + | |||
| + | ``` | ||
| + | R1(config)# | ||
| + | ``` | ||
| + | |||
| + | |||
| + | ``` | ||
| + | C: | ||
| + | Trying 10.0.0.1 ...Open | ||
| + | User Access Verification | ||
| + | Username: admin3 | ||
| + | Password: < | ||
| + | R1#sh run | ||
| + | Building configuration... | ||
| + | Current configuration : 1380 bytes | ||
| + | version 15.1 | ||
| + | ! | ||
| + | R1# | ||
| + | ^ | ||
| + | % Invalid input detected at ' | ||
| + | ``` | ||
| + | |||
| + | También se pueden establecer contraseñas para los niveles. Si no se especifica nivel, es el 15: | ||
| + | |||
| + | ``` | ||
| + | R1(config)# | ||
| + | R1(config)# | ||
| + | ``` | ||
| + | |||
| + | ``` | ||
| + | C: | ||
| + | Trying 10.0.0.1 ...Open | ||
| + | User Access Verification | ||
| + | Username: admin1 | ||
| + | Password: < | ||
| + | R1>show run | ||
| + | ^ | ||
| + | % Invalid input detected at ' | ||
| + | R1> | ||
| + | Password: < | ||
| + | R1#show run | ||
| + | Building configuration... | ||
| + | Current configuration : 1380 bytes | ||
| + | ! | ||
| + | version 15.1 | ||
| + | no service timestamps log datetime msec | ||
| + | no service timestamps debug datetime msec | ||
| + | no service password-encryption | ||
| + | ! | ||
| + | hostname R1 | ||
| + | ``` | ||
| + | |||
| + | ==== Acceso SSH ==== | ||
| + | |||
| + | Para configurar el acceso por SSH, primero hay que generar una clave RSA en el servidor de al menos 768 bits. Esto se hace con `ip domain-name < | ||
| + | |||
| + | |||
| + | ``` | ||
| + | R1(config)# | ||
| + | R1(config)# | ||
| + | The name for the keys will be: R1.flackbox.com | ||
| + | Choose the size of the key modulus in the range of 360 to 2048 | ||
| + | for your General Purpose Keys. Choosing a key modulus greater | ||
| + | than 512 may take a few minutes. | ||
| + | How many bits in the modulus [512]: 768 | ||
| + | % Generating 768 bit RSA keys, keys will be non- | ||
| + | exportable...[OK] | ||
| + | ``` | ||
| + | |||
| + | SSh usa la misma línea que Telnet, pero con la directiva `transport input < | ||
| + | |||
| + | |||
| + | ``` | ||
| + | R1(config)# | ||
| + | R1(config)# | ||
| + | R1(config-line)# | ||
| + | R1(config-line)# | ||
| + | R1(config-line)# | ||
| + | R1(config)# | ||
| + | |||
| + | ``` | ||
| + | |||
| + | Luego, desde cualquier cliente ssh: | ||
| + | |||
| + | ``` | ||
| + | C:\> ssh –l admin 10.0.0.1 | ||
| + | Open | ||
| + | Password: < | ||
| + | R1> | ||
| + | ``` | ||
start/cursos/cisco.1774959463.txt.gz · Last modified: 2026/03/31 12:17 by 192.168.10.1
