That's easy. Requirements drive configurations. See your requirements and the answer will be there waiting for you.
--Th13
Our scars have the power to remind us that our past was real. -- Hannibal Lecter.
Talent is God given. Be humble. Fame is man-given. Be grateful. Conceit is self-given. Be careful. -- John Wooden
I am no cisco guru by any means, but I am sure it suffers from the most standard of security issues. Make sure its encrypted and in synch with the rest of your network security. I would look at this link to begin with.