O'Reilly logo

Implementing Cisco Networking Solutions by Harpreet Singh

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Controlling device access using RADIUS

The device can be accessed through Telnet or SSH using virtual terminal lines, known as VTY ports. The recommendation is to use SSH and disable access to Telnet to enhance security. However, in some cases Telnet may be a requirement; therefore the VTYs must be secured.

The use of password protection to control or restrict access to the CLI of your router is one of the fundamental elements of an overall security plan for network devices. Protecting the router from unauthorized remote access, typically Telnet or SSH, is important. At the same time, you should not overlook protecting the router from an unauthorized local access using the console ports. The physical safety of the devices is foremost, before ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required