O'Reilly logo

Cisco® Networking All-in-One For Dummies® by Edward Tetz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4: Cisco Security Best Practices

In This Chapter

check.png Looking into the areas of management

check.png Delving into Authentication, Authorization, and Accounting

check.png Collecting and monitoring logs

check.png Securing protocols

check.png Managing the network’s configuration

check.png Implementing physical security

Security is often the elephant in the room. Security is there, and obvious, but nobody wants to be the one who brings it up or acknowledges it. I know a company that is absolutely paranoid about security and has hoops upon hoops for people to jump through to get new equipment added to the network, but it also has remote computers that have almost no security on them that have access to the entire network with no network Access Control Lists (ACLs). Why? Because a common misconception is that if you manage ACLs on remote devices, you can get yourself in a bind by doing things wrong.

Security should never be skipped because ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required