SecHard

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this content. View the current version.

Compare with Current View Version History

« Previous Version 3 Current »

Many protocols are used to transport sensitive network management data. Secure protocols should be used whenever possible. A secure protocol option includes using SSH instead of Telnet so that both authentication data and management information are encrypted. If Telnet is used, all traffic flows in plaintext and can be subject to Telnet Communication Sniffing, Telnet Brute Force Attack and Telnet DoS - Denial of Service attacks.

line vty 0 15

transport input ssh

  • No labels

0 Comments

You are not logged in. Any changes you make will be marked as anonymous. You may want to Log In if you already have an account.