0% found this document useful (0 votes)
17 views6 pages

SSH Username Pwd

The document outlines various security measures including authentication methods and timeouts. It specifically mentions local login and SSH as key components of the security framework. The repetition of SSH indicates its importance in the security protocols discussed.

Uploaded by

Bekele Asamnew
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views6 pages

SSH Username Pwd

The document outlines various security measures including authentication methods and timeouts. It specifically mentions local login and SSH as key components of the security framework. The repetition of SSH indicates its importance in the security protocols discussed.

Uploaded by

Bekele Asamnew
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Security

Authentication
Time outs
Login Local
SSH
SSH
SSH

You might also like