Network exists in both physical and cyber worlds. Both have physical portion and content portion.
Even in cyber perspective, both the physical media and the info exchange are required to protect but most focus is on the content part.
If the adversary is able to access network equipment physically, then all those secured configuration will become insecure. Therefore, in any security assessment, physical aspect must not be forgotten.