security habits…

if you’re like me in the home lab there’s little security set up going on… why, because it’s a pain in the ass… how often do you build a topology with absolutely no authenticaton anywhere? raise your hand, don’t be shy? even basics like vty’s and enable secret?

guilty as charged…

i need to get into better habits here… security everywhere… that means no telnet, routing protocols always authenticated, key chains, md5, aaa, method lists, logging, the whole smash…

if you don’t use it in the lab, you’ll just get sloppy in production…

paul stewart is a ccie security guy i often see on cln.. that’s right, security ccie… that’s like whoa, and shit… he has great articles over at packetu:

http://www.packetu.com/2012/09/06/changing-privilege-levels-for-cisco-ios-commands/

that one up above is about customizing privilege levels individually for commands…

gotta get serious… i have this idea that getting comfortable with security will take some of the bite out of r&s…

a basic question? why does the crypto key generate rsa modulus x command crap out if you haven’t created a hostname other than the default out of the box, and a domain name?

both domain name and hostname are used in the key pair crypto creates…

that’s why…