AP Networking

123456789101112131415161718
Across
  1. 5. The physical address of a NIC; used for port security filtering.
  2. 7. Legacy remote access protocol that sends data in plain text (Insecure!).
  3. 8. Password type that uses MD5 hashing for high security.
  4. 9. The embedded software/OS of the networking hardware.
  5. 12. Secure, encrypted replacement for Telnet (Port 22).
  6. 13. Command to manually disable an interface to prevent access.
  7. 15. Local management port used for initial device setup.
  8. 16. Recording system events to a buffer or server for "Accounting."
  9. 18. Command used to move from User EXEC to Privileged EXEC mode.
Down
  1. 1. Virtual lines used for remote management access.
  2. 2. Unsecured data that is readable by anyone (Avoid this!).
  3. 3. A legal notice displayed to users before login.
  4. 4. Framework for Authentication, Authorization, and Accounting.
  5. 6. Scrambling data so only authorized parties can read it.
  6. 10. A virtual interface used for testing and stable remote management.
  7. 11. Configuring a port to carry traffic for multiple VLANs.
  8. 14. Mathematical process used to scramble passwords for storage.
  9. 17. The most secure modern wireless encryption protocol.