This chapter addresses what most people think about when they start to secure a
router—authenticating users and restricting access. There are many more ways to
access Cisco routers than most network administrators realize. Each of these methods
can have different authentication methods and can be set to allow various levels
of privilege access. It is important that all methods of access are either secured or disabled.
The chapter briefly discusses the differences between authentication and
authorization and then moves on to the fundamentals of how Cisco routers handle
controlling and protecting access....