Rick, SSH provides encrypted traffic between the client and the Cisco device as well as authentication. This prevents sniffing attacks against Telnet sessions where the ENABLE password would otherwise be passed in the clear. TACACS/RADIUS provide centralized authentication and authorization and audit facilities. This makes it possible to assign different levels of access to the router based on userID. And to audit what people do when they are connected. TACACS is better at this than RADIUS.
Cisco also supports SNMP traps for things for various type of accesses including any that change the configuration. My preference is to use SSH for Telnet sessions and TACACS for auditing with SNMP traps for alert notifications when configs get changed. -- Bill Stackpole, CISSP ----- Original Message ----- From: "Rick Brown" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Monday, January 14, 2002 7:44 AM Subject: Telnet/SNMP security (Slightly OT) > I'm trying to tighten security behind my firewall and > thought you guys might be able to give me some > feedback. I've got an all Cisco infrastructure and I > want to secure access to the switches and routers. > Should I use TACACS+ or SSH? I need something free > (or close to it) because the bean counters are being > tight. Also, what's the best way to secure SNMP? We > use Novell's eDirectory and so it would be nice to > find something that could work with LDAP but that may > asking for too much. Could IPSec be used to secure > any of this? Thanks! > > __________________________________________________ > Do You Yahoo!? > Send FREE video emails in Yahoo! Mail! > http://promo.yahoo.com/videomail/ > _______________________________________________ > Firewalls mailing list > [EMAIL PROTECTED] > http://lists.gnac.net/mailman/listinfo/firewalls _______________________________________________ Firewalls mailing list [EMAIL PROTECTED] http://lists.gnac.net/mailman/listinfo/firewalls
