|
Controlling
access to network devices such as switches and routers should be one
of the first priorities of an access policy. Every device at every
layer of the hierarchical model should have a plan for physical
security, password protection, privilege levels, and Telnet/VTY
access.
|