O'Reilly logo

Juniper Networks® Reference Guide: JUNOS™ Routing, Configuration, and Architecture by James Sonderegger, Doris Pavlichek, Lawrence H. Dwyer, Thomas M. Thomas, Wayne W. Downing, Rajah Chowbay

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Router Access and System Administration

There are two categories of methods for accessing any router. A physical connection can be made from relatively close proximity or a connection can be made from a remote location. A physical close-proximity connection is by default the only way of connecting to the router. Once a physical connection has been made and the appropriate configuration statements put into place, connections can be established from remote locations as needed. With the convenience of remote access comes security risk; therefore, measures must be taken to prevent unauthorized access to the device. These measures include enabling services that will allow authorized users to access the system and defining permissions and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required