Below are few of the practical examples of implementing Network Compliance policies. These are only for sample reference and actual implementation might differ.
Network banner are electronic messages that provide notice of legal rights to users of computer networks. This example is to verify if the login banners are configured using NetYCE Compliance.
Protocols such as telnet transmit data without any encryption, so it is advised to be disabled. This example is to verify if telnet is disabled for remote login purpose using Compliance
Passwords are sensitive information and to be displayed in encrypted format. This example shows us how to implement compliance policy to verify the devices are configured to show passwords in encrypted format.
remote_acls are used to restrict the management access to network devices. This example shows how to implement compliance policy to verify the necessary configuration.
tacacs is a security application that provides centralized validation of users attempting to gain access to a router or network access server. This example helps in validating tacacs configuration using NetYCE Compliance module
rfc1583 the method used to calculate summary route costs. To minimize the chance of routing loops, all Open Shortest Path First (OSPF) routers in an OSPF routing domain should have RFC compatibility set identically. This example shows how to implement compliance policy to verify the necessary configuration.