| http://www.w3.org/ns/prov#value | - Users are advised to use encrypted login protocols, such as SSH or Kerberized Telnet; IPSec encryption for all management traffic, including Telnet, SNMP, and HTTP; or a one-time password system such as S/KEY or OPIE. Together with a TACACS+ or RADIUS server, encrypted login protocols provide control over interactive logins and privileged access.
|