Many protocols are used to transport sensitive network management data. Secure protocols should be used whenever possible. A secure protocol option includes using SSH instead of Telnet so that both authentication data and management information are encrypted. If Telnet is used, all traffic flows in plaintext and can be subject to Telnet Communication Sniffing, Telnet Brute Force Attack and Telnet DoS - Denial of Service attacks.
line vty 0 15
transport input ssh
0 Comments