Configure device management and access control
The "Configure device management and access control" module provides you with the instructions and Cisco hardware to develop your hands on skills in configuring and securing device access control and management plane, this module contains the following exercises: 1. Device access using the AUX and Console ports, 2. Secure remote access...
The Configure device management and access control module provides you with the instructions and Cisco hardware to develop your hands on skills in configuring and securing device access control and management plane, this module contains the following exercises:
- Device access using the AUX and Console ports
- Secure remote access
- Securing the management plane using MPP
Exercise 1 – Device access using the AUX and Console ports
In this exercise you will learn how to configure access to a Cisco router using the VTY lines, AUX and console ports.
Typically most engineers will access Cisco equipment VIA the VTY lines, ideally using SSH (this is covered in the next exercise) but to get to the point of accessing the device via SSH if the device is fresh out of the box then you will normally apply some base configuration using the console port.
Exercise 2 – Secure remote access
In today’s security conscious world, it’s important that access to your infrastructure devices are as secure as they can be, one of the elements of this security is using secure protocols to remotely access your network infrastructure.
In this module you will secure remote access to a Cisco router by enabling SSH and HTTPS and disabling insecure protocols including telnet and HTTP.
Exercise 3 – Securing the management plane using MPP
In this exercise you will secure the management plane on a Cisco router. The management plane feature enables an engineer to control which network management packets are allowed to enter in to the device.
In many ways this is similar to firewalls in that you often have a dedicated management interface that is used to configure and control the device. In this instance we are restricting management protocols to an individual or set of interfaces using the management plane protection feature.
IT & Cybersecurity certification hands on practice labs and practice exams for certifications and skill development.
See the full benefits of our immersive learning experience with interactive courses and guided career paths.