Cisco Router Secure Connection Configuration

Configuring Cisco Router for Secure Connections

Question

An engineer must configure a Cisco router to initiate secure connections from the router to other devices in the network but kept failing.

Which two actions resolve the issue? (Choose two.)

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E.

BC.

The issue is related to the router's inability to establish secure connections with other devices in the network. To resolve this issue, the engineer needs to perform the following two actions:

C. Configure a crypto key to be generated: To establish a secure connection, the router must have an RSA key pair. The crypto key generate rsa command can be used to generate an RSA key pair with a specific modulus size. This command will prompt the engineer to enter a modulus size between 360 and 4096 bits, a common modulus size for SSH is 2048 bits.

B. Configure a domain name: To configure the router to initiate secure connections, a domain name must be configured on the router. The domain name can be configured using the ip domain-name command. The domain name is used to generate the RSA key pair, which is required for secure connections. If the domain name is not configured, the router will not be able to generate an RSA key pair and secure connections will not be possible.

A. Incorrect answer: The transport input ssh command on the console specifies the protocol used to access the console port of the router, which is not related to the router's ability to establish secure connections to other devices.

D. Incorrect answer: Configuring a source port for the SSH connection to initiate is not required as the router will use a random source port by default when initiating an SSH connection.

E. Incorrect answer: Configuring a TACACS+ server and enabling it is not related to the router's ability to establish secure connections to other devices.

Therefore, options C and B are the correct answers to resolve the issue.