How to Configure Telnet in Cisco Packet Tracer


OBJECT: How to Configure Telnet Connection
REQUIRED SOFTWARE: Cisco Packet Tracer 8.1.1

Network Diagram

Setup this network:

How to Configure Telnet in Cisco Packet Tracer
Router#configure terminal 
Router(config)#hostname R1
R1(config)#enable password cisco
R1(config)#enable secret cisco123
R1(config-line)#line vty 0 2
R1(config-line)#password vty
R1(config)#interface fastEthernet 0/0
R1(config-if)#ip address
R1(config-if)#no shutdown 

Go to PC1

User Access Verification
Password: vty

To understand the operation of SSH by accessing the routers remotely by PCs

VTY password:-

➤If we want to configure router from a remote location, then we have to configure vty and enable password on router.

➤by-default we configure 4 or 5 virtual line in vty password so that 4 or 5 user can simultaneously access router on telnet.

➤यदि हम router को किसी remote location से configure करना चाहते है, तो हमे router पर vty और enable पासवर्ड configure करना होता है। 

➤by-defualt हम vty पासवर्ड मैं  4 या 5 virtual line को configure करते है , ताकि 4 या 5 user एक साथ router को telnet पर access कर सके।

Download Cisco Packet Tracer 6.22
Download Cisco Packet Tracer 8.1.1


Dear Students, This Purpose of Preparation of Computer Network Online Test is in 30 Questions English. There is a collection of questions asked in the CCNA Exam. On answering each question one point will be given. And it is mandatory to bring 50% marks to pass. To start the test you have to click on Start Button. All the questions will have to be answered. Go to Last and click on Finish Button, after which your Result will appear on the screen. After clicking Finish, there will be three option shows below 1.Restart Quiz 2.View Question 3.Show Leader-board. After filling your name and e-mail id by clicking on the show leader-board, click on send, after which your result will be shown.




1. In generating RSA keys, what does Cisco recommend for the key modulus size?

Answer is A)

2. What is the command that will reset the RSA keys on a Cisco router?

Answer is D)

3. Which of the following is not a Cisco IOS security feature commonly found on Cisco ISRs?

Answer is D)

4. Which command can turn on logging of unsuccessful login attempts?

Answer is B)
auto secure.

5. What is the name of the secure files used in conjunction with the Cisco IOS Resilient Configuration?

Answer is A)

6. Which of the following is the graphical user environment that is used to configure many router settings and provides several wizards to automate certain tasks?

Answer is A)

7. Which of the following is not one of the high – level tasks that you can perform from Cisco SDM?

Answer is D)
Configuration Management

8. Which command would you enter to use Cisco SDM in a secure web session?

Answer is B)
ip http secure – server

9. What is the global configuration mode command that will allow you to specify the number of failed login attempts that trigger a quiet period?

Answer is D)
login block – for

10. What is the global configuration mode command that allows you to configure a banner message for use when attempting to access a router via Telnet or SSH?

Answer is D)
banner motd

11. What is the default delay between successive login attempts if the login block – for command is issued without further qualifications?

Answer is D)
1 sec

12. Which of the following is not one of the files necessary to run Cisco SDM on your router?

Answer is A)

13. When an IPsec VPN tunnel is configured, how does the router determine what traffic is to traverse the VPN tunnel?

Answer is C)
Access list

14. Which IPsec protocol does both encryption and authentication?

Answer is A)

15. What is the default encryption type when using SDM to configure an IPsec VPN tunnel?

Answer is D)

16. In Cisco Easy VPN, what is the advantage of network extension plus mode over network extension mode?

Answer is D)
A loopback address is configured.

17. If you were working in the IOS command – line interface and needed to check on the status of a VPN tunnel, what command would you enter?

Answer is A)
show crypto ipsec sa

18. You would use ESP because it supports both encryption and authentication. ESP uses IP Protocol 50.

Answer is D)
Both A & B

19. When configuring a site – to – site VPN, what is the type that is designated when using a crypto map?

Answer is D)

20. Put the following steps in the order in which they occur.

Answer is D)
All of Above

21. What command is used to designate that you will use Diffie – Hellman Group 2 for your key exchange?

Answer is A)
group 2

22. What is the name of the set of both the encryption algorithm and the integrity protocol used in the crypto map?

Answer is D)
Transform set

23. Which of the following modes encrypts the entire packet and adds a new header for IPsec?

Answer is A)
Tunnel mode

24. When configuring a crypto map for a VPN tunnel, what is the command to configure the remote end IP that you need to communicate with?

Answer is C)
set peer ip address

25. What purpose does the preshared key serve?

Answer is D)

26. What protocol is considered a hybrid encryption protocol?

Answer is A)

27. The Subject field of a certificate contains what information?

Answer is D)
Company information

28. How many certificates are involved in the user authentication process?

Answer is C)
It depends

29. How many prime numbers are used in the Diffie – Hellman algorithm?

Answer is D)

30. What is the key length of Diffie – Hellman Group 2?

Answer is D)
1024 – bit

About me