Allowed use in the certified configuration
Any configuration. Use of key-based
authentication is recommended.
Remote
Authentication Dial In
User Service
If used for authentication of ASA
administrators, secure through IPsec.
RSA SecurID
authentication
If used for authentication of ASA
administrators, secure through IPsec.
Simple Network
Management Protocol
Outbound (traps) only. Recommended to
tunnel through IPsec.
As described in the section 3.3.1 of this
document.
A protocol used for
terminal emulation
Use of SSH is recommended.
Trivial File Transfer
Protocol
Recommend using SCP instead, or tunneling
through IPsec.
Follow best practices for the secure usage as
there are no restrictions on use of these
protocols
Dynamic Trunking
Protocol
Follow best practices for the secure usage as
there are no restrictions on use of these
protocols
Standardized wide
area network
technology that
specifies the physical
and logical link layers
of digital
telecommunications
channels using a
packet switching
methodology
Follow best practices for the secure usage as
there are no restrictions on use of these
protocols