MikroTik Certified Switching Engineer (MTCSWE)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 Network Devices
2 MikroTik RouterOS Basics
2-1 Introduction to RouterOS
2-2 RouterOS Interface Types
2-3 Basic Configuration
2-4 User Management
2-5 System Logging
3 Switching Fundamentals
3-1 Introduction to Switching
3-2 MAC Addresses
3-3 Ethernet Frame Structure
3-4 VLAN Basics
3-5 Trunking and Inter-VLAN Routing
4 MikroTik SwitchOS Basics
4-1 Introduction to SwitchOS
4-2 SwitchOS Interface Types
4-3 Basic Configuration
4-4 User Management
4-5 System Logging
5 VLAN Configuration
5-1 VLAN Creation and Configuration
5-2 VLAN Trunking Protocol (VTP)
5-3 Inter-VLAN Routing
5-4 VLAN Security
6 Spanning Tree Protocol (STP)
6-1 Introduction to STP
6-2 STP Operation
6-3 Rapid Spanning Tree Protocol (RSTP)
6-4 Multiple Spanning Tree Protocol (MSTP)
6-5 STP Configuration
7 Link Aggregation
7-1 Introduction to Link Aggregation
7-2 Link Aggregation Control Protocol (LACP)
7-3 Static Link Aggregation
7-4 Link Aggregation Configuration
8 Quality of Service (QoS)
8-1 Introduction to QoS
8-2 QoS Models
8-3 Traffic Shaping and Policing
8-4 QoS Configuration
9 Security Features
9-1 Introduction to Network Security
9-2 Port Security
9-3 Access Control Lists (ACLs)
9-4 DHCP Snooping
9-5 Dynamic ARP Inspection (DAI)
10 Advanced Switching Topics
10-1 Layer 3 Switching
10-2 Multicast Routing
10-3 Link Layer Discovery Protocol (LLDP)
10-4 Power over Ethernet (PoE)
11 Troubleshooting and Maintenance
11-1 Common Switching Issues
11-2 Troubleshooting Tools
11-3 Switch Maintenance
11-4 Backup and Restore
12 MikroTik Certification Exam Preparation
12-1 Exam Overview
12-2 Study Tips
12-3 Practice Questions
12-4 Exam Registration and Scheduling
9.1 Introduction to Network Security Explained

9.1 Introduction to Network Security Explained

Key Concepts of Network Security

Network Security involves protecting the integrity, confidentiality, and availability of network resources. Key concepts include:

Firewalls

Firewalls are essential components of network security that act as a barrier between a trusted internal network and untrusted external networks. They use predefined security rules to determine whether to allow or block specific traffic.

Example: A MikroTik router can be configured with a firewall to block all incoming traffic except for specific services like HTTP and HTTPS. This ensures that only necessary traffic is allowed, reducing the risk of unauthorized access.

Intrusion Detection Systems (IDS)

IDS are systems that monitor network traffic for suspicious activities and potential security breaches. They analyze traffic against a set of known attack patterns and generate alerts when suspicious activity is detected.

Example: An IDS can be configured on a MikroTik router to monitor for known attack signatures, such as port scans or malware activity. If a port scan is detected, the IDS can generate an alert, allowing administrators to take appropriate action.

Intrusion Prevention Systems (IPS)

IPS are advanced systems that not only detect but also take action to prevent security breaches. They can automatically block or mitigate suspicious activities based on predefined rules and policies.

Example: An IPS can be configured on a MikroTik router to automatically block traffic from known malicious IP addresses. This proactive approach helps in preventing potential security breaches before they can cause harm.

Access Control

Access Control mechanisms regulate who or what can view or use resources in a network. This includes user authentication, authorization, and accounting (AAA) to ensure that only authorized users and devices can access network resources.

Example: A MikroTik router can be configured with RADIUS authentication to ensure that only users with valid credentials can access the network. This enhances security by limiting access to authorized personnel only.

Encryption

Encryption is a technique used to convert data into a secure format to prevent unauthorized access. It ensures that data is unreadable to anyone who does not have the correct decryption key.

Example: A MikroTik router can be configured to use IPsec VPN to encrypt data transmitted between two remote sites. This ensures that the data remains secure and confidential, even if intercepted by unauthorized parties.