From the course: Cisco Network Security: Secure Access

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Compare in-band and out-of-band management

Compare in-band and out-of-band management - Cisco Tutorial

From the course: Cisco Network Security: Secure Access

Start my 1-month free trial

Compare in-band and out-of-band management

[Narrator] - On an enterprise network we'll have a variety of devices to manage that include routers, switches, adaptive security appliances, along with intrusion detection and intrusion prevention. It's essential to defend the network and the devices against the many possible threats that include unauthorized access, man in-the-middle attacks, denial service, botnets, and privilege escalation. If any of the infrastructure devices are compromised, the security of the entire network can be compromised. As a result, there are a number of best practices for securing the network infrastructure. One concept, is Network Foundation Protection, which includes tools, technologies, controls, and services to prevent unauthorized access and defend against key threats to the infrastructure. Devices often provide a range of ways to access them so that we can manage and secure the IOS. That includes Telnet, remote login, HTTP, and Secure Shell. Cisco IOS-based platforms have console and modem access…

Contents