Device access control
We are always excited to configure our networking devices so that we can forward traffic efficiently either on a local network or between subnets. It's always a fascinating experience to design an efficient and robust network for your organization or customer. However, our networking devices have important and confidential information being stored on them, such as the device's configurations, routing protocol, and network routers; MAC addresses; and even Syslog information. If an attacker or unauthorized person is able to successfully access your network devices, that person can perform a lot of malicious actions, such as reconfiguring your network routes to forward traffic to another path, erasing the Cisco IOS image and device's configurations, adjusting Spanning-Tree paths, and so on.
In this section, we will focus on securing physical, remote, and administrative access to your Cisco devices.
Securing console access
When you acquire...