Security sage's guide to hardening the network infrastructure