You have several operating groups in your enterprise that require differing access restrictions to the routers to perform their job roles. These groups range from Help Desk personnel to advanced troubleshooters. What is one methodology for controlling access rights to the routers in these situations?
|
Configure ACLs to control access for the different groups
|
|
Configure multiple privilege level access
|
|
Configure TACACS+ to perform scalable authentication
|
|
Implement syslogging to monitor the activities of the groups
|