10.2_Access Control Flashcards
The simplest method of remote access authentication is to configure a login and password combination on ____
console, vty lines, and aux ports
TRUE OR FALSE
The method of configuring the password and login is the easiest to implement, but it is also the weakest and least secure.
TRUE
This method provides no accountability and the password is sent in plaintext. Anyone with the password can gain entry to the device.
Code to implement password on console, vty lines, and aux
line vty 0 4
password cisco
login
line console 0 5
password cisco
login
____ is a more secure form of remote acceass
SSH
SSH implementation codes
ip domain-name example.com
crypto generate rsa general-keys modulus 2048
username Admin secret Str0ng3rPa55word
ssh version 2
line vty 0 4
transport input ssh
login local
AAA
Authentication, Authorization, and Accounting
__ is a way to control who is permitted to access a network (authenticate), what they can do while they are there (authorize), and to audit what actions they performed while accessing the network (accounting).
AAA
___ are two common methods of implementing AAA authentication.
Local and server-based
AUTHENTICATION
___ stores usernames and passwords locally in a network device such as the Cisco router. It is ideal for small networks
Local AAA
AUTHENTICATION
With the ___method, the router accesses a central AAA server.
server-based AAA Authentication
Server-Based AAA Authentication
The router uses either the ___(RADIUS) or ___ (TACACS+) protocols to communicate with the AAA server
Remote Authentication Dial-In User Service
Terminal Access Controller Access Control System
____ is automatic and does not require users to perform additional steps after authentication.
AAA Authorization
__ governs what users can and cannot do on the network after they are authenticated.
Authorization
___uses a set of attributes that describes the user’s access to the network
Authorization
__ collects and reports usage data.
AAA accounting