Discarding Insecure Access Channels

The access requirements of services must be met preferentially based on service requirement analysis. When an access requirement has multiple access channel services, the insecure access channels must be obsoleted, whereas the secure channels must be selected.

The access channels of higher security levels are selected. The following table lists the security levels of the various access channels:

Table 1 Assessment of the security capabilities of access channels

Access Requirement

Secure Channel

Insecure Channel

Remote login

SSHv2

Telnet

File transfer

SFTP

FTP, TFTP

Network management system (NMS)

SNMPv3

SNMPv1/v2

Routing Information Protocol (RIP) route

RIPv2

RIP

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >