3.1. Authentication Versus Authorization3.2. Points of Access3.3. Basic Access Control3.3.1. Authentication and Authorization3.3.1.1. Console password3.3.1.2. AUX and VTY passwords3.3.1.3. Privileged-level access control3.3.1.4. Local username access control3.3.1.5. TACACS access control3.3.1.6. Disabling console, auxiliary, and VTY logins3.3.2. TFTP Access3.4. Remote Administration3.4.1. Danger of Remote Administration3.4.2. Dial-up Access3.4.2.1. Reverse Telnet3.4.3. VTY Access3.4.3.1. Disabling VTY access3.4.3.2. SSH3.4.3.3. Limiting VTY access by IP3.4.3.4. Additional VTY settings3.4.4. HTTP/Web Access3.4.4.1. Limiting HTTP access by IP3.4.4.2. HTTP authentication3.5. Protection with IPSec3.5.1. Setting up ISAKMP3.5.2. Creating the IPSec Extended ACL3.5.3. Creating IPSec Transforms3.5.4. Creating the Crypto Map3.5.5. Applying the Crypto Map to an Interface3.6. Basic Access Control Security Checklist