Chapter 4: Cisco Security Best Practices

In This Chapter

check.png Looking into the areas of management

check.png Delving into Authentication, Authorization, and Accounting

check.png Collecting and monitoring logs

check.png Securing protocols

check.png Managing the network’s configuration

check.png Implementing physical security

Security is often the elephant in the room. Security is there, and obvious, but nobody wants to be the one who brings it up or acknowledges it. I know a company that is absolutely paranoid about security and has hoops upon hoops for people to jump through to get new equipment added to the network, but it also has remote computers that have almost no security on them that have access to the entire network with no network Access Control Lists (ACLs). Why? Because a common misconception is that if you manage ACLs on remote devices, you can get yourself in a bind by doing things wrong.

Security should never be skipped because ...

Get Cisco® Networking All-in-One For Dummies® now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.