ABSTRACT

A gaping hole in many of today’s networks is the weak security surrounding the network devices themselves-the routers, the switches, and the access servers. In all public networks and in some private networks, the network devices are shared virtually among different user communities. Access to the configuration schemes and command lines is most often an ‘‘all or nothing’’ proposition-the network administrator

gets either read-only privileges or read=write privileges. In this case, authentication equals authorization. Herein lies the problem.