Chapter 6. Securing the Management Plane
The chapter covers the following topics:
Planning a Secure Management and Reporting Strategy
• Securing the Console Line and Disabling the Auxiliary Line
• Securing VTY Access with SSH
• Securing VTY Access with SSH Example
• Securing VTY Access with SSH Using CCP Example
• Securing Configuration and IOS Files
Implementing Role-Based Access Control on Cisco Routers
• Configuring Privilege Levels
• Configuring Privilege Levels Example
• Configuring RBAC via the CLI
• Configuring RBAC CLI Example
• Configuring a Superview Example
Get CCNA Security (640-554) Portable Command Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.