Ccna security Lab Securing the Router for Administrative Access



Download 162.04 Kb.
Page53/54
Date17.12.2020
Size162.04 Kb.
#55010
1   ...   46   47   48   49   50   51   52   53   54
Assignment #3-4 - Securing the Router for Administrative Access

Test connectivity.


Ping from PC-A on the R1 LAN to PC-C on the router R3 LAN. If pings from PC-A to PC-C are not successful, troubleshoot before continuing.

  1. Reflection

    1. Explain the importance of securing router access and monitoring network devices.

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________



    1. What advantages does SSH have over Telnet?

_______________________________________________________________________________________

_______________________________________________________________________________________



    1. How scalable is setting up usernames and using the local database for authentication?

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________



    1. Why it is better to have centralized logging servers rather than to have the routers only log locally?

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________



    1. What are some advantages to using AutoSecure?

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________




  1. Download 162.04 Kb.

    Share with your friends:
1   ...   46   47   48   49   50   51   52   53   54




The database is protected by copyright ©ininet.org 2024
send message

    Main page