Prevent PPP credentials from being used for vty/console access
I'm playing with routers and serial interfaces in my home lab while studying for an exam. I've got two routers using PPP with CHAP authentication to successfully connect, but having defined the username of the opposite router and the password they have in common I can SSH in to manage the routers with those credentials. I have tried one set of alternate privileges (username otherrouter privilege 0 password password) but that didn't help.
Obviously any in-production router that's authenticating to a service provider would have ACLs restricting vty access, but I'd still like to deny usernames that aren't intended for management to be able to ssh or telnet in from the internal side, if it's possible.
Sorry for the simpleton question, I've been trying to use print and web resources to find an answer but apparently I don't know how to ask the question right... Any suggestions for further reading on the topic would be appreciated.
Hmm, interesting question, that I would also like the answer to. I just tried to find a solution to this in my lab and could not come up with anything :) But I agree, there should be a way to lock a chap/pap user from having access to the vty/console lines.
GeneralWhich Cisco Secure products include access to SecureX?What are the SecureX data retention/privacy policies?What is SSE?How can I unlink my smart account from SSE and link it to a new account?Do I have to use the same SSE region as the SecureX regio...
More people are working remotely, and this increases the risk of security breaches and the difficulty in defending remote workers where they work and securing the devices they use.
Learn about Cisco Remote Secure Worker solutions that verify workers, secu...
GeneralWhich Cisco Secure products include access to SecureX?What are the SecureX data retention/privacy policies?What is SSE?How can I unlink my smart account from SSE and link it to a new account?Do I have to use the same SSE region as the Secur...
On December 8, FireEye reported that it had been compromised in a sophisticated supply chain attack: more specifically through the SolarWinds Orion IT monitoring and management software. The attackers leveraged business software updates in order to distr...