top of page
Writer's pictureTor's Tech Talk

2.8 - Managing Devices with Telnet, SSH, and More

Greetings, Tech Talkers!


This is Tor, your trusted network engineering uplink! Today, we’re diving into the world of remote management—specifically, how we manage our network devices using Telnet, SSH, and other methods. Whether you’re configuring a router, monitoring a switch, or troubleshooting an access point, the ability to manage devices remotely is a fundamental skill for network engineers.


In this article, we’ll explore the ins and outs of Telnet, SSH, and other management protocols. By the end, you’ll know when to use each tool and how to configure them on your network devices securely.


Let’s get started!


The Basics of Remote Management


Managing network devices requires access to their command-line interfaces (CLI). While connecting directly via a console cable is an option, it’s not practical for large or geographically distributed networks. That’s where **remote management protocols** come in, allowing us to connect to and configure devices over the network.


The most common methods for remotely accessing devices include:


  • Telnet

  • SSH (Secure Shell)

  • Web-based management (HTTP/HTTPS)

  • SNMP (Simple Network Management Protocol)


Each method offers different features, security levels, and use cases, so let’s break them down.


Telnet: The Original Remote Access Protocol


Telnet is one of the oldest remote management protocols, dating back to the early days of networking. It allows administrators to access the CLI of network devices over a network. However, Telnet has one major flaw—it **transmits data in plain text**, including your username and password, making it highly insecure in modern networks.


Key Features:

  • Text-based interface to manage devices.

  • Provides CLI access for configuration and troubleshooting.

  • Operates over port **23**.


Telnet Configuration on Cisco Devices:

Here’s how you can enable Telnet on a Cisco router or switch:


Router(config)# line vty 0 4
Router(config-line)# password your_password
Router(config-line)# login
Router(config-line)# transport input telnet

Note: Telnet should be disabled in most production environments due to security concerns. It is better suited for lab environments or isolated networks.


SSH: The Secure Alternative to Telnet


SSH (Secure Shell) is the modern, secure alternative to Telnet. It offers the same functionality—CLI access for managing devices—but with the added benefit of encryption. This means that all data, including your login credentials, is protected from eavesdroppers.


Key Features:

  • Provides encrypted remote access to network devices.

  • Uses public key cryptography for authentication.

  • Operates over port 22.

  • Offers a more secure method for managing devices than Telnet.


SSH Configuration on Cisco Devices:

To enable SSH on a Cisco device, follow these steps:

Router(config)# ip domain-name example.com
Router(config)# crypto key generate rsa modulus 2048
Router(config)# username admin privilege 15 secret your_password
Router(config)# line vty 0 4
Router(config-line)# transport input ssh
Router(config-line)# login local
Router(config-line)# exit
Router(config)# ip ssh version 2

Recommendation: Use RSA keys with a minimum size of 2048 bits for secure connections. For even stronger security, consider using ECDSA or ED25519 keys.


Web-Based Management (HTTP/HTTPS)


Many modern network devices support web-based management via HTTP or HTTPS. This allows administrators to manage devices using a graphical user interface (GUI) instead of the CLI. While HTTP management is unencrypted and should be avoided, **HTTPS** uses SSL/TLS to secure the connection, making it a safer option.


Key Features:

  • User-friendly GUI for managing network devices.

  • HTTPS provides encryption for secure web access.

  • Operates over ports 80 (HTTP) and 443 (HTTPS).


HTTPS Configuration on Cisco Devices:

To enable HTTPS for web-based management on a Cisco device, you can use the following commands:


Router(config)# ip http secure-server
Router(config)# ip http authentication local
Router(config)# ip http secure-port 443
Router(config)# username admin privilege 15 secret your_password

PROTIP: Disable HTTP and redirect all web management traffic to HTTPS for secure access.


SNMP: Monitoring and Managing Devices


SNMP (Simple Network Management Protocol) is not a method for direct remote access like Telnet or SSH, but it is essential for monitoring and managing network devices. SNMP allows network administrators to collect data on device performance, health, and status in real-time.


Key Features:

  • Used primarily for monitoring and managing network devices.

  • Supports traps for event notifications (e.g., interface down, high CPU usage).

  • Operates over port 161.


SNMP Configuration on Cisco Devices:

To configure SNMP on a Cisco device, you can use the following commands:


Router(config)# snmp-server community public RO
Router(config)# snmp-server community private RW
Router(config)# snmp-server enable traps

PROTIP: Use SNMPv3** whenever possible for **encrypted** and **secure monitoring**.


Other Management Access Options


In addition to Telnet, SSH, and HTTPS, there are other management methods that network engineers should be aware of:


  • Console Access: The most direct method, using a console cable to physically connect to the device. This method is useful when a device is unreachable via the network.

  • TACACS+/RADIUS: These are protocols used for centralized authentication, authorization, and accounting. Instead of configuring user accounts locally on each device, you can use a TACACS+ or RADIUS server to manage user authentication across all network devices.


Example: TACACS+ Configuration on Cisco Devices:

Router(config)# aaa new-model
Router(config)# tacacs-server host 192.168.1.100
Router(config)# tacacs-server key your_key
Router(config)# aaa authentication login default group tacacs+ local

Centralized management tools like TACACS+ streamline user access management across large networks, especially in enterprise environments.


Best Practices for Managing Devices Securely


When managing network devices remotely, it’s important to follow security best practices to avoid unauthorized access:


  • Use SSH or HTTPS over Telnet or HTTP. Avoid sending credentials in clear text.

  • Use complex passwords and change them regularly.

  • Implement ACLs (Access Control Lists) to restrict remote access to trusted IP addresses.

  • Enable logging and monitoring to track login attempts and configuration changes.

  • Disable unused services like Telnet or HTTP when not in use to reduce the attack surface.

  • Consider multi-factor authentication (MFA) for enhanced security.


Wrapping It Up


Whether you’re using SSH for secure CLI access or HTTPS for web-based management, remote device management is critical for maintaining and configuring your network infrastructure. While Telnet still exists in some networks, it’s important to prioritize secure protocols like SSH and HTTPS whenever possible.


By understanding and properly configuring these remote access methods, you’ll ensure your network remains secure, reliable, and efficiently managed.


Until next time, Tech Talkers—may your management sessions be secure, your connections stable, and your devices running smoothly!


Thanks,

Tor – Your trusted network engineering uplink.

1 view0 comments

Recent Posts

See All

Cisco VTP – To VTP, or Not to VTP

Greetings, Tech Talkers! This is Tor from Tors Tech Talk, your trusted network engineering uplink. Today, we’re tackling the ultimate...

Course Outro: Wrapping Up Your CCNA Journey

Greetings, Tech Talkers! This is Tor, your trusted network engineering uplink! We've journeyed together through the vast landscape of...

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page