In remote management, upstream or downstream interfaces of a network device are configured to accept the console connection such Telnet or SSH. The management traffic flows along with other transiting data traffic thru same interface.
Many technologies are leveraged to achieve business objectives and values to customer, but it comes with a price of security risk associated with them. Managing those risk would be an superficial act wasting time and money unless we understand how they are configured, maintained and operated, and then understanding the terms, definitions and concept associated with those technologies becomes paramount, Then you know how to control these risk effectively and efficiently