Configuring Virtual Terminal Lines For Remote Console Access - Cisco 1941W Configuration Manual

Cisco 3900 series, cisco 2900 series, cisco 1900 series
Hide thumbs Also See for 1941W:
Table of Contents

Advertisement

Appendix A
Cisco IOS CLI for Initial Configuration
Examples
Specifying a Default Route: Example
!
ip routing
!
ip route 192.168.24.0 255.255.255.0 172.28.99.2
!
ip default-network 192.168.24.0
!
Sample Output for the show ip route Command
Router# show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
Gateway of last resort is 172.28.99.2 to network 192.168.24.0
C
S
S*
C
Router#

Configuring Virtual Terminal Lines for Remote Console Access

Virtual terminal (vty) lines are used to allow remote access to the router. This section shows you how to
configure the virtual terminal lines with a password, so that only authorized users can remotely access
the router.
The router has five virtual terminal lines by default. However, you can create additional virtual terminal
lines as described in the Cisco IOS Terminal Services Configuration Guide, Release 12.4. See the
Configuring Terminal Operating Characteristics for Dial-In Sessions
Line passwords and password encryption is described in the Cisco IOS Security Configuration Guide,
Release 12.4. See the
on Networking Devices
Lists: Overview and
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default
172.24.0.0 255.255.255.0 is subnetted, 1 subnets
172.24.192.0 is directly connected, GigaEthernet0
172.24.0.0 255.255.0.0 [1/0] via 172.28.99.0
192.168.24.0 [1/0] via 172.28.99.2
172.16.0.0 255.255.255.0 is subnetted, 1 subnets
172.16.99.0 is directly connected, GigaEthernet1
Security with Passwords, Privilege Levels, and Login Usernames for CLI Sessions
section. If you want to secure the vty lines with an access list, see
Guidelines. Also see the
Using the Cisco IOS CLI to Perform Initial Configuration
section.
Cisco IOS Password Encryption Facts
Access Control
tech note.
A-11

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

194129012911295139252921 ... Show all

Table of Contents