Cisco Home Lab

I decided to put up my own networking lab for my studies. I grabbed a deal at a local online classified ads website and got a set of routers and switches for a reasonable price. Because I spend most of my time in the office, I realized I need to have a remote access to my Cisco home lab whenever and wherever I am. This can be done by dedicating one of my Cisco routers to function as an access server and connecting into it using reverse SSH. To complete this task, I went to Amazon and ordered a Cisco NM-32A and an octal cable.

 

 

Configuration

I had two options – Reverse Telnet or Reverse SSH. For uniformity and security, I use SSH to connect to all the devices I manage. With the multiple security issues present in Telnet, I would recommend using Reverse SSH if the hardware / resources permits. Though you may think that it is only a practice lab, I say it would be best to practice as if you were handling a production environment rather than to work on live as if you were on a lab.

Configuring Reverse SSH is fairly easy. Below is the overview of what needs to be done:

  1. Change the default hostname of the device
  2. Set the ip domain-name
  3. Generate crypto keys
  4. Configure different port for each line TTY using rotary groups

 

The first two steps we need to do is to set the devices hostname and the domain-name. Without one of the two, or by leaving the hostname at the default, we would not be able to generate our crypto key which is the main ingredient for SSH to work.

Let’s proceed to the next page for the excerpt of my current running-config.

Leave a Reply