
At the SFO(config)# prompt, type enable secret te%56t and press Enter. At the SFO# prompt, type configure terminal and press Enter. At the SFO> prompt, type show start and press Enter. At the SFO> prompt, type enable and press Enter. Save your changes to the startup-config file. Require yaba8&y as the password for VTY line 0. Configure the router to require te%56t as the password to enter privileged exec mode. Notice that a password is currently set for VTY lines 1-4, and no password is set for VTY 0. In this lab, your task is to configure the following policies: Use the show start command to view the current configuration. Removing the password using the login command while requiring a password results in the following prompt:Password required but none set.

If you type no login, access is granted without prompting for the password, even if one is set. The no login command identifies whether the password is required. Remove a password while retaining the login line to prevent access through the VTY lines. Use the login command to require a password for the console or VTY lines. The password cannot be read by using the show run or show start commands. Use the enable secret command to encrypt the password in the configuration file. Remember: The enable secret or enable password command requires a password to switch to privileged exec mode. She asks you to implement policies on the SFO router to control access. You may also use Wireshark capture and analysis tool.Your supervisor is concerned about unauthorized access to the router console.

To capture all packets from a specific host on the network:

Tcpdump: verbose output suppressed, use -v or -vv for full protocol decode To capture all packets on the WAN (the below assumes that interface eth1 is the WAN interface):

tcpdump relies on libcap, therefore it can produce standard pcap analysis files which may be processed by other tools. It may be used to capture packets on the fly and/or save them in a file for later analysis. Tcpdump is a network capture and analysis tool.
