guides:user:compliance:examples:telnet
Differences
This shows you the differences between two versions of the page.
guides:user:compliance:examples:telnet [2022/04/29 08:39] – created pgels | guides:user:compliance:examples:telnet [2024/07/03 12:31] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ======Verify telnet is disabled====== | ||
+ | Disabling Telnet and enabling SSH is one of the best practices suggested by the official Cisco Hardening Guide for IOS devices to secure the management plane. Below example helps in validating telnet configuration disabled using NetYCE Compliance module | ||
+ | |||
+ | campus01-b02-access01 and campus01-b02-access02 are the two reference devices which we are using for this example. | ||
+ | |||
+ | ===Example config=== | ||
+ | ==campus01-b02-access01# | ||
+ | {{: | ||
+ | |||
+ | ==campus01-b02-access02# | ||
+ | {{: | ||
+ | |||
+ | |||
+ | ===How its done=== | ||
+ | Below are the steps to create new policy. | ||
+ | |||
+ | Operate -> Compliance -> Policies -> New-> | ||
+ | |||
+ | {{: | ||
+ | |||
+ | Click on the Node Group to select the relevant group of devices to add. Node group named " | ||
+ | |||
+ | {{: | ||
+ | |||
+ | Rule -> New | ||
+ | |||
+ | {{: | ||
+ | {{: | ||
+ | |||
+ | ===Report/ | ||
+ | |||
+ | Below is how to create reports to see the results of the compliance policies. | ||
+ | |||
+ | Operate -> Compliance -> Reports -> New -> Report Name “test” -> Report type “Policies” -> Policy Name “Sample 2 : Login banner” -> Show Report | ||
+ | |||
+ | {{: | ||
+ | |||
+ | This was a simple example to understand how to implement compliance policy to verify if telnet access is disabled or enabled on the network devices. |