Most of the Cisco routers suport SSH, especially if you are running an IOS image that supports IPSec.What we did until all of our routers supported SSH, was set up a secure SSH server in our internal network (trusted part of the network). Then, for access from the Internet, we SSH to the server and then telnet from there to the router. This way, the connection to our network was encrypted, and only the part between the SSH server and router was unencrypted. Of course, this doesn't protect us from the inside (internal network), but does prevent sniffing and hijacking from the Internet (outside). Hope it helps.
Mark Maher Ochsner Clinic Foudation >>> "Tony Toni" <[EMAIL PROTECTED]> 12/10/02 08:45PM >>> We were currently wrote up by our external auditors because we use telnet to access all of our routers. In some cases we use a filtered Telnet service...but that is not the normal practice. We are a fairly good size company with about 1000+ routers. I am charged with coordinating a response to the auditors. I know all of the security issues involved with Telnet...ie login id and password sent across the network in clear text, etc. My question: Is it possible to use SSH or CISCO TACACS+ to encrypt the entire Telnet session? Is there a way to ensure no one can sniff the login id and password? The Network Services Group is adamant that neither SSH or CISCO TACACS+ will work on a router to correct the security issue. Tony CIA,CISA,CDP,MBA Security and Audit Services Nations Banking & Trust PS: I have been playing phone tag with the auditor that wrote us up...to see what they recommend...have not reached him yet. _________________________________________________________________ Tired of spam? Get advanced junk mail protection with MSN 8. http://join.msn.com/?page=features/junkmail