Skip to content
Top Three Policies in Network Configuration Management

When a network needs repair, modification, expansion or upgrading, the administrator Network Configuration Management refers to the network configuration management database to determine the best course of action.

Top Three Policies in Network Configuration ManagementThis database contains the locations and network addresses of all hardware devices, as well as information about the programs, versions and updates installed in network computers.

A main focus to consider when discussing network configuration management is Policy checking capabilities. There are three key policy checking capabilities which should not be ignored, and they are as follows

  1. Regulatory Compliance Policy
  2. Vendor Default Policy
  3. Security Access Policy

Regulatory compliance policy

The obvious one is regulatory compliance policy. If you have a network configuration system you should always implement a regular checking system to ensure consistency with design standards, processes and directives with internal and external regulators.

In the past people would use manual processes this is something that was time intensive, costly, inaccurate and more importantly, your business was at risk and open to potential attacks through not having the desired real-time visibility.

Now thanks to the infamous cloud this is all a thing of the past.

Vendor default policy

Vendor default policy is a best practice recommendation to scan the configurations of your infrastructure devices and to eradicate potential holes so that the risk can be mitigated. Furthermore so that the infrastructure security access is maintained to the highest possible levels.

Such holes may arise due to your configuration settings being overlooked. Sometimes a default username and passwords, or SNMP ‘public’ and ‘private’ community strings etc. are not removed, leaving a hole in your security for potential attacks.

Security Access Policy

Access to infrastructure devices are policed and controlled with the use of AAA (Authentication, Authorization, Accounting), TACACS+, RADIUS servers, and ACLs (Access Control Lists) so as to increase security access into device operating systems.

It is very important therefore that the configuration elements of infrastructure devices have the consistency across the managed estate. It is highly recommended to create security policies so that the configurations of security access can be policed for consistency and reported on if changed, or vital elements of the configuration are missing.

Thanks to NMSaaS for the article. 

Related Posts

Using Network TAPs to enhance network security in School Networks

Using Network TAPs to enhance network security in School Networks

Enhance school network security with Network TAPs for improved visibility, threat detection, and compliance with regulations
The Definitive Guide to Synchronized Clock Systems in 2025

The Definitive Guide to Synchronized Clock Systems in 2025

Accurate and synchronized timekeeping is more than just a convenience—it’s a critical component of operational efficiency, safety, and compliance. Whether…
TAPs Overview: The Start of Visibility - 2024

TAPs Overview: The Start of Visibility - 2024

The Evolution of Network Visibility: Why TAPs Are Key Network change is accelerating, driven by growing complexity, new regulations, cloud…
WiFi and LAN network testing with Candela Technologies

WiFi and LAN network testing with Candela Technologies

WiFi and LAN networks are the backbone of modern businesses, and testing them is essential to prevent outages, optimize performance,…
How to Upgrade an Old School Clock System Without Breaking the Bank

How to Upgrade an Old School Clock System Without Breaking the Bank

Upgrading your old clock system can seem like a costly endeavor—between equipment, installation, and potential downtime, the expenses can add…