

Note : The router s used with CCNA hands-on lab s are Cisco 4221 with Cisco IOS XE Release 1 6.9.4 (universalk9 image). You will then test the security measures to verify that they are properly implemented and working correctly. You will also use the IOS CLI to configure common, basic best practice security measures. In this lab, you will configure the network devices in the topology to accept SSH sessions for remote management. This includes end user devices, servers, and network devices, such as routers and switches.

It is recommended that all network devices be configured with at least a minimum set of best practice security commands. Part 3: Configure Basic Security Measures on the Switch Background / Scenario Part 2: Configure Basic Security Measures on the Router
