Management Protocols and Functions

The protocols that you use to manage your network can also be sources of vulnerability. This section examines common management protocols and how they can be exploited.

Telnet

If the managed device does not support any of the recommended protocols, such as SSH and SSL, Telnet may have to be used (although this protocol is not highly recommended). You should recognize that the data within a Telnet session is sent as clear text, and may be intercepted by anyone with a packet sniffer located along the data path between the managed device and the management server. The data may include sensitive information, such as the configuration of the device itself, passwords, and so on.

Regardless of whether SSH, SSL, or ...

Get CCSP Self-Study: Securing Cisco IOS Networks (SECUR) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.