background image
I
n this chapter, we'll show you how to identify the important com-
ponents when you're designing and implementing access policies. How users
access the network directly affects how you build your network and what
policies you implement.
Access policies start at the physical equipment and extend throughout the
entire internetwork. In its IOS, Cisco provides different security options that
you can run on a switch or router to help implement access policy security.
Definition of an Access Policy
T
o document a standard implementation for user access, a company
or corporation creates policies. Those policies should include access policies,
which describe how users access the network and even how to stop
unwanted connections into the network.
Before any access control is implemented on a network, a standard access
policy must be created. It would be difficult for all companies to use a stan-
dard access policy because networks and business requirements vary widely
between companies. However, you should keep in mind some basic stan-
dards when designing your access policies.
The following list includes some of the most common access policy
standards:
Physical security to the network equipment
VLAN management and port security
Password implementation
Control of access to the enterprise network
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com