A more declarative framework
You woke up one morning in a cold sweat from a nightmare you had about a potential network security breach. You realized that your network contains valuable digital assets that should be protected. You have been doing your job as a network administrator, so it is pretty secure, but you want to put more security measures around your network devices just to be sure.
To start with, you break the objective down into two actionable items:
- Upgrading the devices to the latest version of the software, which requires:
- Uploading the image to the device.
- Instructing the device to boot from the new image.
- Proceeding to reboot the device.
- Verifying that the device is running with the new software image.
- Configuring the appropriate access control list on the networking devices, which includes the following:
- Constructing the access list on the device.
- Configuring the access list on the interface, which in most cases is under the interface configuration section so that it can...