From the course: Cisco Network Security: Secure Routing and Switching
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Examine privilege levels
From the course: Cisco Network Security: Secure Routing and Switching
Examine privilege levels
- (Instructor) When configuring devices, Cisco iOS is separated into different command modes. Each mode has a set of commands available. In general, the order you access the device is as follows. When starting a session, you'll begin in User EXEC mode, which only has a limited number of commands that do not change the configuration of the router. Then you'll type "enable", and the once in Privileged EXEC, you can then run any EXEC commands. You'll then hit "config t", and from Privileged EXEC, you go into Global config, where you can enter commands to configure general system characteristics. From Global config, you enter specific configuration modes, for example, an interface. In an IT department of an organization, each employee can have various job functions. However, not all job functions should have the same level of access to the managed devices. Cisco operating systems have two approaches of granting infrastructure access: privilege Levels, and role-based Command Line…
Contents
-
-
-
-
Layer 3 attacks: Overview1m 57s
-
(Locked)
Secure the control plane3m 9s
-
(Locked)
Examine privilege levels3m 29s
-
(Locked)
Assign privilege levels5m 25s
-
(Locked)
Configure IOS role-based CLI access3m 53s
-
(Locked)
Implement IOSR Resilient Configuration2m 24s
-
(Locked)
Routing update authentication2m 45s
-
(Locked)
Challenge: EIGRP authentication1m 3s
-
(Locked)
Solution: EIGRP authentication2m 43s
-
-
-
-
-