Security is paramount in networking. Your network acts as the gateway to your domain. Industry standards call for the deployment of specialized equipment and devices such as firewalls to ensure security. Despite this, it's advisable to understand how to configure basic security on your SROS device. The SROS is equipped with the functionality to connect to RADIUS or TACACS+ servers for accounting, authorization, and authentication. Additionally, you have SNMP tools like the NPF that handle AAA for SROS if deployed in conjunction. The focus of this course will be to assist you in configuring and deploying users with password and access constraints. Filters will be addressed in a later chapter.
For configuring users, deploy the code below.
"configure system security
user Netnich
password "some_complex_phrase"
access console ftp snmp li
console
member administrative
exit
Logs are crucial for any device, proving extremely useful for security and troubleshooting. The SROS family includes predefined system logs, specifically logs 99 and 100. The SROS logs encompass five main event types:
for the exam, you are ok to list 4 event sources. Main, Security, Change and Debug.
LOG Destinations
Logs can be saved to various destinations:
Networking Niche
Copyright © 2024 Networking Niche - All Rights Reserved.
Powered by GoDaddy