10.2 Basic Security
10.2.1 Basic security techniques

Controlling access to network devices such as switches and routers should be one of the first priorities of an access policy. Every device at every layer of the hierarchical model should have a plan for physical security, password protection, privilege levels, and Telnet/VTY access.