Cisco NX-OS Security and Operations Best Practices 2016
English | Size: 1.16 GB
Category: Cisco | Networking | Security
As the Nexus platform has become a staple in the data center environment, securing the environment begins with the Nexus Operating System (NX-OS). The recently published NX-OS hardening guide seeks to deliver on that. The Cisco NX-OS Hardening Guide provides information to help administrators and engineers secure NX-OS system devices, inherently increasing the overall security of a network environment. With the ever-increasing opportunity for exploits and vulnerabilities to prevail, it is imperative that organizations adopt and apply best practices to harden their infrastructure devices. We all know that an environment is only as strong as the weakest link, thus every effort should be made to ensure that each device is hardened.
Unique to the NX-OS hardening guide is the cross-spectrum approach predicated on the feature ubiquity and concepts inherent to the Nexus product line, such as infrastructure scalability, operational continuity, and transport flexibility. What does this mean? Merely that there are unique aspects to understanding and securely configuring, deploying and administering an NX-OS platform. With virtualization and high availability at every turn, the security principles must not only keep pace, but remain a few steps ahead!
Now that you have purchased or are contemplating the purchase of a Nexus platform, and have read through the product documentation and configuration guides regarding the extensive list of features and new concepts, now what? With so much riding on that data center, and having a Nexus at the core, hardening is not a formality, but a necessity. As with all Cisco security best practices and security centric whitepapers, your home base is the Cisco Security Intelligence Operations portal.
Cisco NX-OS Hardening Guide
Links are Interchangeable - No Password - Single Extraction