What is a secure configuration option for remote access to a network device?
- Configure SSH.
- Configure 802.1x.
- Configure an ACL and apply it to the VTY lines.
- Configure Telnet.
-
Answers Explanation & Hints: A secure configuration option for remote access to a network device is to configure SSH (Secure Shell).
SSH is a secure protocol for remote access to network devices that provides confidentiality, integrity, and authentication. SSH encrypts all data transmitted between the client and server, preventing eavesdropping and unauthorized access to sensitive information. SSH also uses public key cryptography for user authentication, ensuring that only authorized users can access the device.
On the other hand, Telnet is an insecure protocol that transmits data in plain text, allowing attackers to intercept and read sensitive information. Configuring 802.1x can enhance network security by enforcing port-based access control, but it is not specifically designed for remote access to network devices. Configuring an ACL and applying it to the VTY lines can help restrict access to authorized users, but it does not provide encryption or user authentication, making it less secure than SSH.