The following considerations can further improve network security:
Ensure that clocks are synchronized on all network devices. Set the network time and have all sources synchronized to a known, reliable time source.
Use Terminal Access Controller Access Control System (TACACS) or Remote Authentication Dial-In User Service (RADIUS) authentication for highly secure environments as a means of limiting administrative access to the network.
Define an IP network that can be easily secured using ACLs at subnets or network boundaries whenever possible.