A technician is planning a remote-access strategy to manage routers and switches on a dedicated management network.
The management network is segregated from the production network and uses site-to-site VPN connections.
Some of the equipment does not support encryption.
Which of the following should the technician choose that all the equipment would support?
A.
Telnet B.
SSL C.
SSH D.
IPSec.
A.
A technician is planning a remote-access strategy to manage routers and switches on a dedicated management network.
The management network is segregated from the production network and uses site-to-site VPN connections.
Some of the equipment does not support encryption.
Which of the following should the technician choose that all the equipment would support?
A.
Telnet
B.
SSL
C.
SSH
D.
IPSec.
A.
In this scenario, the technician needs to select a remote-access strategy that can securely manage routers and switches on a dedicated management network. The management network is segregated from the production network, and the technician plans to use site-to-site VPN connections. However, some of the equipment does not support encryption, so the technician needs to select a protocol that all equipment can support.
A. Telnet is an unencrypted protocol, which means that data transmitted over Telnet is not secured and can be intercepted and read by unauthorized parties. It is not recommended to use Telnet for remote management, especially in a production environment where security is crucial.
B. SSL (Secure Sockets Layer) is a secure protocol used for secure communication over the internet. However, SSL is not typically used for remote management of routers and switches. It is commonly used for securing web traffic.
C. SSH (Secure Shell) is a secure protocol used for remote management of routers, switches, and other network devices. SSH encrypts all data transmitted between the client and the server, making it secure against eavesdropping and other forms of tampering. SSH is the recommended protocol for remote management in a production environment.
D. IPSec (Internet Protocol Security) is a protocol used for securing communication over IP networks. It can provide secure communication between two or more devices, but it is not typically used for remote management of routers and switches.
Therefore, the best option for the technician is to choose SSH as the remote-access strategy for managing routers and switches on a dedicated management network. SSH provides secure communication, encrypting all data transmitted between the client and the server, and is widely supported by most routers and switches.