Using separate access methods for regular communication versus security and management can increase security. Examine the use of in-band and out-of-band management.