From the course: Cisco Network Security: Secure Routing and Switching

Secure routing and switching: Overview

From the course: Cisco Network Security: Secure Routing and Switching

Start my 1-month free trial

Secure routing and switching: Overview

- [Narrator] Network administrators take steps to secure the network. They use Endpoint protection, anti-malware, and security education, training, and awareness. Network administrators should also take steps to secure the two most common devices on a network: routers and switches. Let's compare the two. Routers connect networks. Each interface on a router represents a separate network. Routers use a routing table to make a decision. And routers generally only have two or four ports. Switches connect computers on a subnetwork. Switches use a switching or CAM table in order to make a decision to forward packets. Switches have port density, as a switch can have four, 12, 24, or 48 ports. Both routers and switches have vulnerabilities. If a malicious person with basic networking knowledge can gain access to a switch or router on the network, they can modify the system integrity in order to steal information or disrupt communications. A router good practice includes, securing the control plane, and configuring privilege levels, along with ensuring routing update authentication. With a switch, good practice includes, implement DHCP snooping and port security, along with activating BPDU guard, root guard, and loop guard. Malicious activity against a switch or router can modify system integrity and disrupt communications. As a result, network administrators should take steps to secure the routers and switches in an organization.

Contents