tutorial - Security audits of network device configuration files