This document provides instructions for securing network devices, including securing administrative access, implementing device hardening, and implementing traffic filtering. It discusses securing access to the device through the console port, VTY lines, and auxiliary port by configuring login passwords. It also recommends encrypting all passwords, configuring session timeouts, implementing access levels for administrators, and configuring warning banners. For the management plane, it suggests securing protocols like SNMP, SSH, and disabling unneeded services. Device hardening includes securing the management, control, and data planes through password policies and encryption. Traffic filtering can be implemented through access control lists.