Overview
The need to control access to the network increases as the number of applications used on the network increase in both quantity and size. This chapter will focus on some of the methods used to implement access control policy in the campus network. We will first define the components of an access policy, then discuss some of the methods of policy implementation for each component.

Securing the campus network involves the management of physical devices through passwords and access lists as well as securing the physical access to the network through port security. Traffic management control will be done through the use of applied lists (applied to interfaces) and routing tables. This chapter includes the following topics:

  • Definition of an Access Policy 
  • Managing Network Devices
  • Access Layer Policy
  • Distribution Layer Policy
  • Core Layer Policy