Security, Agility, Design, and Deployment
Let's learn about the security, agility, design, and deployment aspects of the network automation process.
We'll cover the following...
Security
Some of the largest security breaches occur because telnet is open on a port with a public-facing IP address. Security standards and best practices can now be hard-coded into templates guaranteeing the enforcement of policies. Often complex configurations are required on interfaces at the access layer to address security risks.
Consider the access layer and all the following security standards that should be implemented:
- Spanning-tree toolkit commands
- Bridge Protocol Data Unit (BPDU) controls
- Portfast
- 802.1x or port-security commands
- Data and voice VLANs
- QoS settings
- CDP settings
- Power over Ethernet (PoE)