Example: marketing
Controlling Switch Access With Passwords And Privilege
Found 1 free book(s)Hardening Network Devices - U.S. Department of Defense
media.defense.govAug 18, 2020 · Each method should be secured to prevent any unauthorized access to the network device. The following security configurations need to be implemented to limit and secure access to the router or switch from the console, auxiliary, and Virtual Teletype (VTY) ports: Use multi-factor authentication using hardware tokens and passwords.