{"id":203,"date":"2011-06-23T10:57:00","date_gmt":"2011-06-23T10:57:00","guid":{"rendered":"https:\/\/belayclientstaging.zone\/securityeverafter\/2011\/06\/23\/control-4-secure-configurations-of-network-devices-such-as-firewalls-routers-and-switches\/"},"modified":"2011-06-23T10:57:00","modified_gmt":"2011-06-23T10:57:00","slug":"control-4-secure-configurations-of-network-devices-such-as-firewalls-routers-and-switches","status":"publish","type":"post","link":"https:\/\/securityeverafter.com\/control-4-secure-configurations-of-network-devices-such-as-firewalls-routers-and-switches\/","title":{"rendered":"Control 4 – Secure Configurations of Network Devices Such as Firewalls, Routers, and Switches"},"content":{"rendered":"

Control 4 is similar to Control 3<\/a> in that it is concerned with maintaining a secure configuration. This time the focus is on network devices.<\/p>\n

What is the last thing you did on your network devices? Likely it was add a rule to permit a new traffic flow. When was the last time you made sure the configuration is exactly what you expected? <\/p>\n

Where to start?<\/u>
Several authoritative hardening guides exist and are freely available. Choose one of the below and plan to spend a few hours making sure your network device configurations are secure.<\/p>\n