Summary

This module introduced the security wheel, a continuous process built around a security policy, which is the most critical part of network security. The Security Wheel consists of four steps including secure, monitor, test, and improve. This policy is the plan for successful network security. As the saying goes, "fail to plan, plan to fail".

This module also covered techniques to control access to routers and the network by managing access at the console ports and terminal lines, as well as setting up passwords, accounts and privilege levels. For security purposes, network devices should be configured to only support the traffic and protocols the network needs. Furthermore, administrators should use SSH when managing routers and other key network devices in order to protect passwords and sensitive data.