<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Tagir, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/which-two-of-the-three-method-allow-you-to-avoid-eavesdropping/m-p/3063878#M147224</link>
    <description>&lt;P&gt;Tagir,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any such way of management which is encrypted will help in avoiding eavesdropping.&lt;/P&gt;
&lt;P&gt;a) SSH is encrypted and is a good option, and that is why preferred over telnet.&lt;/P&gt;
&lt;P&gt;b) OOB depend what kind of management it is, usually it is also using SSL so secure for example, CSM.&lt;/P&gt;
&lt;P&gt;c) SNMPv3 ideally has the encryption feature, so we can even go for that.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Overall, I would say it depends from network to network and our requirement to use the correct option.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;Pulkit&lt;/P&gt;</description>
    <pubDate>Fri, 27 Jan 2017 09:20:02 GMT</pubDate>
    <dc:creator>Pulkit Saxena</dc:creator>
    <dc:date>2017-01-27T09:20:02Z</dc:date>
    <item>
      <title>which two of the three method allow you to avoid eavesdropping traffic when you are managing device</title>
      <link>https://community.cisco.com/t5/network-security/which-two-of-the-three-method-allow-you-to-avoid-eavesdropping/m-p/3063877#M147222</link>
      <description>&lt;P&gt;ssh&lt;/P&gt;
&lt;P&gt;oob&lt;/P&gt;
&lt;P&gt;snmpv3&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I really can not understatnd&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:50:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/which-two-of-the-three-method-allow-you-to-avoid-eavesdropping/m-p/3063877#M147222</guid>
      <dc:creator>Tagir Temirgaliyev</dc:creator>
      <dc:date>2019-03-12T08:50:41Z</dc:date>
    </item>
    <item>
      <title>Tagir,</title>
      <link>https://community.cisco.com/t5/network-security/which-two-of-the-three-method-allow-you-to-avoid-eavesdropping/m-p/3063878#M147224</link>
      <description>&lt;P&gt;Tagir,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any such way of management which is encrypted will help in avoiding eavesdropping.&lt;/P&gt;
&lt;P&gt;a) SSH is encrypted and is a good option, and that is why preferred over telnet.&lt;/P&gt;
&lt;P&gt;b) OOB depend what kind of management it is, usually it is also using SSL so secure for example, CSM.&lt;/P&gt;
&lt;P&gt;c) SNMPv3 ideally has the encryption feature, so we can even go for that.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Overall, I would say it depends from network to network and our requirement to use the correct option.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;Pulkit&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2017 09:20:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/which-two-of-the-three-method-allow-you-to-avoid-eavesdropping/m-p/3063878#M147224</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2017-01-27T09:20:02Z</dc:date>
    </item>
    <item>
      <title>Thank you Pulkit,</title>
      <link>https://community.cisco.com/t5/network-security/which-two-of-the-three-method-allow-you-to-avoid-eavesdropping/m-p/3063879#M147227</link>
      <description>&lt;P&gt;Thank you Pulkit,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;b) OOB usually (serial) rollower cable from laptop to consol port of device.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I really can not understatnd&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1 itemprop="name"&gt;which two of the these three methods allow you to avoid eavesdropping traffic when you are managing device&lt;/H1&gt;</description>
      <pubDate>Fri, 27 Jan 2017 11:19:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/which-two-of-the-three-method-allow-you-to-avoid-eavesdropping/m-p/3063879#M147227</guid>
      <dc:creator>Tagir Temirgaliyev</dc:creator>
      <dc:date>2017-01-27T11:19:59Z</dc:date>
    </item>
    <item>
      <title>Tagir,</title>
      <link>https://community.cisco.com/t5/network-security/which-two-of-the-three-method-allow-you-to-avoid-eavesdropping/m-p/3063880#M147230</link>
      <description>&lt;P&gt;Tagir,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;By OOB, i though you meant third party management devices, however, serial/console is fine as cable is connected directly, between laptop and the device. So no one can sniff in.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;However, it is always good to use management options which are encrypted, like SSH and even SNMPv3.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Console can always act as the backup option, if in case if we loose remote access.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;Pulkit&lt;/P&gt;
&lt;P&gt;Please rate helpful posts.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2017 11:48:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/which-two-of-the-three-method-allow-you-to-avoid-eavesdropping/m-p/3063880#M147230</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2017-01-27T11:48:35Z</dc:date>
    </item>
    <item>
      <title>Is it for an exam? I would</title>
      <link>https://community.cisco.com/t5/network-security/which-two-of-the-three-method-allow-you-to-avoid-eavesdropping/m-p/3063881#M147234</link>
      <description>&lt;P&gt;Is it for an exam? I would consider all three answers correct:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;ssh: uses encryption to protect the data&lt;/LI&gt;
&lt;LI&gt;snmp v3:&amp;nbsp;doesn't encrypt the data by default, but when choosing the "priv" mode, it is also encrypted.&lt;/LI&gt;
&lt;LI&gt;oob: Using an OOB connection to the device doesn't say anything about the encryption. It still could be unencrypted like telnet. But OOB typically assumes that there is a dedicated network that can't be accessed by the attacker. If you&amp;nbsp;take this&amp;nbsp;assumption as&amp;nbsp;true, you are protected against eavesdropping. But typically you would also&amp;nbsp;use cryptographically protected communication through an OOB-connection.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Sun, 29 Jan 2017 11:27:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/which-two-of-the-three-method-allow-you-to-avoid-eavesdropping/m-p/3063881#M147234</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-01-29T11:27:30Z</dc:date>
    </item>
  </channel>
</rss>

