Chapter 12: Configuring Device Access Control and VPNs
A key topic within the field of Information Technology (IT) is ensuring secure configurations are always applied to our devices. Secure configurations help to ensure unauthorized persons are not granted access to a device due to a device's misconfiguration. Quite often, hackers can gain access to companies' perimeter devices such as routers and firewalls simply by guessing the required password, and at times, device administrators use default configurations and default user accounts. Sometimes, administrative access is not securely configured, and attackers are able to access devices and perform malicious actions. Ensuring secure access to networking devices should be a top priority for all IT professionals.
In this chapter, you will learn how to secure your networking devices to prevent unauthorized access by implementing secure configuration best practices. Furthermore, you will discover and learn about the importance...