When devices are being configured and implemented to ensure secure network management, it becomes important to consider a few other aspects as well. For a network containing only Cisco routers, configuring the devices will not be a complex task. On the contrary, logging and procuring information from multiple devices could be a complex and challenging task giving rise to a few concerns such as:
- Categorizing important logs/messages from regular ones
- Preventing the tampering of logs
- Ensuring time coordination
- Controlling the volume of messages
- Managing all devices
To address these concerns, it is important for an organization to seek input from the network and security teams to help identify its priorities in reporting and monitoring. A robust and detailed security policy would also help to address the mentioned concerns. Security...