The access requirements of services must be met preferentially based on service requirement analysis. When an access requirement has multiple access channel services, the insecure access channels must be obsoleted, whereas the secure channels must be selected.
The access channels of higher security levels are selected. The following table lists the security levels of the various access channels:
Access Requirement |
Secure Channel |
Insecure Channel |
---|---|---|
Remote login |
SSHv2 |
Telnet |
File transfer |
SFTP |
FTP, TFTP |
Network management system (NMS) |
SNMPv3 |
SNMPv1/v2 |
Routing Information Protocol (RIP) route |
RIPv2 |
RIP |