Installation guide
D-56 Motorola RF Switch System Reference Guide
Management restrictions can be applied to meet specific company policies or industry requirements
mandating only certain devices or staff be granted access to critical infrastructure devices. Management
restrictions can also be applied to reduce the attack footprint of a device when guest credentials are used.
D.5.1 Configuring a Secure Device Deployment
The following sections outline the configuration steps required to restrict management access on an RF
Switch:
• Restricting Management Access
• Disabling Insecure Management Interfaces
• Management User Authentication
To view the running configuration on the RFS6000 switch used to create this secure device management
tutorial, refer to RF Switch Running Configuration on page D-68.
D.5.1.1 Requirements
The following requirements must be met prior to attempting this configuration: