2.8 Network Device Management Access Flashcards
Summarize network device management access (Telnet, SSH, HTTP, HTTPS, console, TACACS+/RADIUS, and cloud managed). (24 cards)
What is Telnet used for in network device management?
For remote Command Line Interface access.
(CLI)
Telnet transmits data in plaintext, which poses a security risk as usernames, passwords, and commands can be intercepted.
Define:
SSH (Secure Shell)
A secure protocol for remote CLI access.
SSH encrypts communication, making it more secure than Telnet, which transmits data in plaintext.
What are the key differences between SSH and Telnet?
- SSH encrypts data; Telnet does not.
- SSH is more secure than Telnet.
- SSH uses port 22; Telnet uses port 23.
SSH is the preferred protocol for secure remote device management.
True or False:
A network device can only be managed via one protocol at a time.
False
Devices can support multiple management protocols, but it is best practice to disable insecure ones like Telnet in favor of more secure options like SSH.
Fill in the blank:
The default port used by Telnet for remote access is ________.
23
Telnet uses port 23 by default to facilitate remote access. It operates in plaintext, meaning all traffic, including credentials, can be intercepted without encryption.
List the process of configuring SSH on a Cisco device.
- Set a domain name
- Generate RSA keys
- Enable the SSH server
- Configure user authentication
SSH configuration ensures secure access and prevents unauthorized remote login.
What is the primary security risk associated with using Telnet?
It sends all data, including usernames and passwords, as clear-text data.
Telnet is generally considered insecure and should be replaced by more secure protocols like SSH, which encrypts communication to protect sensitive data from unauthorized access.
What method is used to access the graphical interface of a WLC?
HTTP/HTTPS
HTTP and HTTPS protocols are used for web-based access to the WLC’s graphical user interface, with HTTPS providing encryption.
True or False:
HTTP is considered secure for remote management of network devices.
False
HTTP sends data in plaintext, while HTTPS provides encrypted, secure communication for web-based device management.
Why is encryption important for protocols like SSH and HTTPS?
It secures data from unauthorized interception.
Without encryption, sensitive information such as passwords and configuration details can be exposed.
What is the primary function of TACACS+?
(Terminal Access Controller Access-Control System Plus)
It is used for authentication, authorization, and accounting.
TACACS+ provides centralized control over device access.
What is the primary function of RADIUS?
It is used for network access authentication and authorization.
RADIUS (Remote Authentication Dial-In User Service) is widely used for managing access to network devices, but it combines authentication and authorization, unlike TACACS+.
List the benefits of using TACACS+ over RADIUS.
- Granular control.
- Encryption of the entire payload.
- Separate authentication, authorization, and accounting.
TACACS+ provides more security and flexibility compared to RADIUS, which is simpler but less secure.
True or False:
RADIUS provides more detailed logging than TACACS+.
False
TACACS+ offers more detailed accounting logs, whereas RADIUS provides basic authentication and accounting logs.
List the steps to configure RADIUS authentication on a network device.
- Define the RADIUS server IP.
- Set a shared secret.
- Configure RADIUS settings.
- Test authentication.
RADIUS enables centralized user authentication and authorization for network access.
Fill in the blank:
A console port provides ______, out-of-band access.
local
The console port is typically used for initial configuration or troubleshooting when network access is unavailable.
Define:
What is a cloud-managed device?
A device managed via a cloud-based platform.
Cloud management centralizes control and enables remote configuration, offering scalability and flexibility across distributed networks.
What are the two modes of operation in the CLI?
User EXEC mode and Privileged (Enable) mode
User EXEC mode allows basic commands, while Privileged mode allows powerful commands.
Fill in the blank:
To switch from User EXEC mode to Privileged mode, enter the command ________.
enable
The “enable” command switches you to Privileged mode, where you can execute configuration commands.
Fill in the blank:
The command used to reboot a Cisco switch from the CLI is ________.
reload
The “reload” command is executed in Privileged mode and is typically used to apply changes or reboot the device for recovery.
What does the command ‘enable secret <password>‘ do?
Defines the password required to access Privileged mode.
The “enable secret” command sets an encrypted password for Privileged mode, offering more security than the “enable password.”
True or False:
The WebUI allows direct configuration and CLI access for verification.
True
The WebUI provides a graphical interface for configuring network devices and can allow CLI access for advanced settings.
What tool can be used to assist with command recall in the CLI?
? (question mark)
The ”?” command provides context-sensitive help, listing valid commands or options in the current CLI mode.
How does pressing the Tab key assist in command entry?
It completes the rest of the command.
The Tab key is a time-saving feature that auto-completes commands or parameters once enough characters have been typed.