Chapter 4: Cisco Security Best Practices
In This Chapter
Looking into the areas of management
Delving into Authentication, Authorization, and Accounting
Collecting and monitoring logs
Securing protocols
Managing the network’s configuration
Implementing physical security
Security is often the elephant in the room. Security is there, and obvious, but nobody wants to be the one who brings it up or acknowledges it. I know a company that is absolutely paranoid about security and has hoops upon hoops for people to jump through to get new equipment added to the network, but it also has remote computers that have almost no security on them that have access to the entire network with no network Access Control Lists (ACLs). Why? Because a common misconception is that if you manage ACLs on remote devices, you can get yourself in a bind by doing things wrong.
Security should never be skipped because ...