A more declarative framework
You woke up one morning in a cold sweat from a nightmare you had about a potential network security breach. You realized that your network contains valuable digital assets that should be protected. You have been doing your job as a network administrator, so it is pretty secure, but you want to put more security measures around your network devices just to be sure.Â
Â
Â
Â
Â
Â
To start with, you break the objective down into two actionable items:
- Upgrading the devices to the latest version of the software, which requires:
- Uploading the image to the device.
- Instructing the device to boot from the new image.
- Proceeding to reboot the device.
- Verifying that the device is running with the new software image.
- Configuring the appropriate access control list on the networking devices, which includes the following:
- Constructing the access list on the device.
- Configuring the access list on the interface, which in most cases is under the interface configuration section so that it can...