Search⌘ K

Security, Agility, Design, and Deployment

Explore how automating your network improves security by embedding best practices into templates, increases agility with modular playbooks, and streamlines the deployment of complex configurations to reduce operational effort and errors.

We'll cover the following...

Security

Some of the largest security breaches occur because telnet is open on a port with a public-facing IP address. Security standards and best practices can now be hard-coded into templates guaranteeing the enforcement of policies. Often complex configurations are required on interfaces at the access layer to address security risks.

Consider the access layer and all the following security standards that should be implemented:

  • Spanning-tree toolkit commands
    • Bridge Protocol Data Unit (BPDU) controls
    • Portfast
  • 802.1x or port-security commands
  • Data and voice VLANs
  • QoS settings
  • CDP settings
  • Power over Ethernet (PoE)
...