Cisco Certified Internetwork Expert (CCIE) - Security
1 Network Security Fundamentals
1-1 Introduction to Network Security
1-2 Threat Landscape
1-3 Security Principles and Concepts
1-4 Security Policies and Procedures
1-5 Risk Management
2 Secure Network Design
2-1 Network Architecture and Design
2-2 Secure Network Design Principles
2-3 Network Segmentation
2-4 Secure Network Access
2-5 Secure Network Services
3 Secure Routing and Switching
3-1 Secure Routing Protocols
3-2 Secure Switching
3-3 Secure Network Management
3-4 Secure Network Access Control
3-5 Secure Network Monitoring
4 Secure Wireless Networking
4-1 Wireless Security Fundamentals
4-2 Secure Wireless Network Design
4-3 Wireless Network Access Control
4-4 Wireless Network Monitoring
4-5 Wireless Network Threats and Mitigation
5 Secure Network Services
5-1 Secure DNS
5-2 Secure DHCP
5-3 Secure Network Time Protocol (NTP)
5-4 Secure Network Address Translation (NAT)
5-5 Secure Network Load Balancing
6 Secure Network Access Control
6-1 Network Access Control (NAC) Concepts
6-2 NAC Implementation
6-3 NAC Deployment Models
6-4 NAC Troubleshooting
6-5 NAC Security Best Practices
7 Secure Network Monitoring and Management
7-1 Network Monitoring Tools
7-2 Network Management Protocols
7-3 Network Logging and Analysis
7-4 Network Incident Response
7-5 Network Forensics
8 Secure Network Virtualization
8-1 Network Virtualization Concepts
8-2 Secure Virtual Network Design
8-3 Secure Virtual Network Management
8-4 Virtual Network Threats and Mitigation
8-5 Virtual Network Monitoring
9 Secure Network Automation
9-1 Network Automation Concepts
9-2 Secure Network Automation Tools
9-3 Network Automation Security
9-4 Network Automation Deployment
9-5 Network Automation Monitoring
10 Secure Network Threats and Mitigation
10-1 Network Threats Overview
10-2 Threat Detection and Prevention
10-3 Threat Mitigation Techniques
10-4 Threat Intelligence
10-5 Threat Response and Recovery
11 Secure Network Incident Response
11-1 Incident Response Planning
11-2 Incident Detection and Analysis
11-3 Incident Containment and Eradication
11-4 Incident Recovery
11-5 Incident Reporting and Lessons Learned
12 Secure Network Compliance and Auditing
12-1 Compliance Requirements
12-2 Network Auditing Tools
12-3 Network Compliance Monitoring
12-4 Network Compliance Reporting
12-5 Network Compliance Best Practices
13 Secure Network Infrastructure
13-1 Secure Network Infrastructure Design
13-2 Secure Network Infrastructure Management
13-3 Network Infrastructure Threats and Mitigation
13-4 Network Infrastructure Monitoring
13-5 Network Infrastructure Compliance
14 Secure Network Operations
14-1 Network Operations Concepts
14-2 Secure Network Operations Management
14-3 Network Operations Monitoring
14-4 Network Operations Incident Response
14-5 Network Operations Compliance
15 Secure Network Troubleshooting
15-1 Network Troubleshooting Concepts
15-2 Secure Network Troubleshooting Tools
15-3 Network Troubleshooting Techniques
15-4 Network Troubleshooting Incident Response
15-5 Network Troubleshooting Best Practices
CCIE Security: Secure Switching

Secure Switching

Key Concepts

Secure Switching involves implementing security measures at the network switch level to protect data and ensure the integrity of network communications. Key concepts include:

1. Port Security

Port Security restricts the number of MAC addresses that can be connected to a switch port. This prevents unauthorized devices from accessing the network. For example, a switch can be configured to allow only a specific MAC address to connect to a particular port, ensuring that only authorized devices can access the network.

2. Access Control Lists (ACLs)

Access Control Lists (ACLs) are used to filter traffic based on predefined rules. ACLs can be applied to switch ports to control which traffic is allowed or denied. For instance, an ACL can be configured to allow only specific IP addresses to access a particular VLAN, enhancing security by restricting unauthorized access.

3. Dynamic ARP Inspection (DAI)

Dynamic ARP Inspection (DAI) is a security feature that protects against ARP spoofing attacks. DAI validates ARP packets in the network to ensure they are legitimate. For example, a switch can be configured to drop ARP packets that do not match the known IP-to-MAC address bindings, preventing attackers from hijacking network traffic.

4. Private VLANs (PVLANs)

Private VLANs (PVLANs) segment a VLAN into multiple isolated segments, enhancing security by preventing communication between devices within the same VLAN. For example, a company can use PVLANs to isolate guest devices from corporate devices, ensuring that guest devices cannot communicate with corporate devices.

Examples and Analogies

To better understand Secure Switching, consider the following examples:

Port Security Example

Imagine a secure office where only authorized personnel can enter through specific doors. Similarly, Port Security ensures that only authorized devices (with specific MAC addresses) can connect to the network through designated switch ports.

ACL Example

Think of a security guard at a gated community who checks IDs and allows only residents to enter. ACLs act like these guards, allowing only specific traffic (based on IP addresses) to pass through switch ports, enhancing network security.

DAI Example

Consider a mailroom that verifies the identity of each mail carrier before delivering packages. DAI verifies the legitimacy of ARP packets, ensuring that only valid network traffic is allowed, preventing ARP spoofing attacks.

PVLAN Example

Imagine a large office building where different departments are isolated from each other, even though they share the same floor. PVLANs create isolated segments within a VLAN, ensuring that devices in one segment cannot communicate with devices in another segment, enhancing security.

Conclusion

Secure Switching is essential for protecting network data and ensuring the integrity of network communications. By implementing Port Security, ACLs, DAI, and PVLANs, organizations can significantly enhance their network security. Understanding these concepts is crucial for anyone pursuing the CCIE Security certification.