Chapter 9. Logins, Authentication, and Remote Access

Logins, Authentication, and Remote Access

Restricting access to your router's configuration and controls is an important part of network management. While it's important to get the router up and running, you don't want just anyone to be able to reconfigure your equipment! It's important to understand how your router can be accessed, how to set passwords and create individual usernames, and how to offer and control access over the network via telnet or SSH.

Lines

Near the end of your router's configuration, you'll see entries like line vty 0 4 and line con 0. These lines are the available methods of getting a command-line prompt on your ...

Get Cisco Routers for the Desperate, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.