What are two recommended ways of protecting network device configuration files from outside network security threats?