Telnet and IPv6 telnet servers are disabled. User admin is configured locally with an encrypted password for authentication via FTP, telnet, SSH, and HTTP. SSH is enabled for user admin with all authentication and service types allowed from all interfaces. The SSH server is configured to use RSA public key encryption with a minimum 2048-bit DH key exchange. VTY lines 4 are configured for AAA authentication of all inbound protocols. Telnet server is enabled, SSH can be used from all interfaces, and a maximum of 21 VTY lines are allowed. SSH client first-use is enabled.
Telnet and IPv6 telnet servers are disabled. User admin is configured locally with an encrypted password for authentication via FTP, telnet, SSH, and HTTP. SSH is enabled for user admin with all authentication and service types allowed from all interfaces. The SSH server is configured to use RSA public key encryption with a minimum 2048-bit DH key exchange. VTY lines 4 are configured for AAA authentication of all inbound protocols. Telnet server is enabled, SSH can be used from all interfaces, and a maximum of 21 VTY lines are allowed. SSH client first-use is enabled.
Telnet and IPv6 telnet servers are disabled. User admin is configured locally with an encrypted password for authentication via FTP, telnet, SSH, and HTTP. SSH is enabled for user admin with all authentication and service types allowed from all interfaces. The SSH server is configured to use RSA public key encryption with a minimum 2048-bit DH key exchange. VTY lines 4 are configured for AAA authentication of all inbound protocols. Telnet server is enabled, SSH can be used from all interfaces, and a maximum of 21 VTY lines are allowed. SSH client first-use is enabled.