Cisco Certified Network Associate (CCNA) - Data Center
1 Data Center Concepts
1-1 Data Center Evolution
1-2 Data Center Infrastructure
1-3 Data Center Services
1-4 Data Center Trends
2 Data Center Network Architecture
2-1 Network Design Principles
2-2 Network Topologies
2-3 Network Virtualization
2-4 Network Security
3 Data Center Switching
3-1 Switching Technologies
3-2 VLANs and Trunking
3-3 Spanning Tree Protocol
3-4 EtherChannel and Link Aggregation
4 Data Center Routing
4-1 Routing Protocols
4-2 Routing Policies
4-3 Routing Redundancy
4-4 Routing Security
5 Data Center Automation and Programmability
5-1 Network Programmability Concepts
5-2 APIs and RESTful Services
5-3 Network Automation Tools
5-4 Network Orchestration
6 Data Center Storage Networking
6-1 Storage Technologies
6-2 Storage Area Networks (SAN)
6-3 Network Attached Storage (NAS)
6-4 Storage Virtualization
7 Data Center Virtualization
7-1 Server Virtualization
7-2 Network Function Virtualization (NFV)
7-3 Hypervisors and Virtual Machines
7-4 Virtual Networking
8 Data Center Security
8-1 Security Concepts
8-2 Access Control
8-3 Threat Detection and Mitigation
8-4 Compliance and Auditing
9 Data Center Operations and Management
9-1 Monitoring and Management Tools
9-2 Capacity Planning
9-3 Troubleshooting Techniques
9-4 Change Management
10 Data Center Technologies and Innovations
10-1 Cloud Computing
10-2 Software-Defined Networking (SDN)
10-3 Network Function Virtualization (NFV)
10-4 Edge Computing
4.4 Routing Security

4.4 Routing Security

Key Concepts

Routing Protocol Authentication

Routing Protocol Authentication ensures that only trusted routers can participate in routing updates. This prevents unauthorized devices from injecting false routing information into the network. Common methods include MD5 authentication for OSPF and EIGRP, and keychains for BGP.

Example: Think of routing protocol authentication as a secure handshake between routers. Only routers with the correct secret code (authentication key) can exchange routing information, ensuring that outsiders cannot interfere.

Prefix Filtering

Prefix Filtering involves configuring routers to accept or reject specific IP address prefixes in routing updates. This helps prevent the propagation of unwanted or malicious routes. Prefix filters can be applied at the ingress and egress points of a network.

Example: Consider prefix filtering as a customs check at a border. Only routes (packages) with approved labels (prefixes) are allowed to enter or leave the network, ensuring that unwanted or harmful routes are blocked.

Route Manipulation Prevention

Route Manipulation Prevention techniques protect against attacks that attempt to alter routing tables to redirect traffic to malicious destinations. This includes measures like route filtering, route poisoning, and using secure routing protocols.

Example: Imagine route manipulation prevention as a security system that detects and prevents any tampering with the network's traffic signs (routing tables). If someone tries to change the signs to redirect traffic to a dangerous area, the system immediately corrects it.

BGP Security

BGP (Border Gateway Protocol) Security focuses on securing the exchange of routing information between different autonomous systems (ASes). Key measures include using BGP communities, route filtering, and BGPsec (BGP Security Protocol) to ensure the integrity and authenticity of BGP updates.

Example: Think of BGP security as international diplomacy protocols that ensure secure and trustworthy communication between different countries (ASes). By using agreed-upon rules and verification methods, BGP security prevents misinformation and ensures reliable routing across the global internet.