This document describes the policies for hardening network and switch security in terms of attack behavior, security policies, and configuration methods. It also provides hardening guidance in terms of the management, control, and forwarding planes.
This document is applicable to all product versions. The functions supported may vary according to models and versions. For details, see the configuration guide.