Figure 1 lists the tasks to limit device access inclucing: secure privileged EXEC access with a password; secure user EXEC access with a password; and secure remote Telnet access with a password. Other tasks include: encrypt all passwords and provide legal notification. Figure 2 list guidelines you should use when choosing a password: use passwords that are more than 8 characters in length; use a combination of upper and lowercase letters, numbers, special characters, and/or numeric sequences; avoid using the same password for all devices; don’t use common words because these are easily guessed.