Switch Security Hardening
Port security: limits which MAC addresses can connect to a switch port. Configure the maximum number of MAC addresses allowed, and specify the action when a violation occurs: Shutdown (most common — port goes err-disabled), Restrict (log and discard violating frames), or Protect (silently discard). Use sticky learning to automatically add current MAC addresses to the secure list without manual entry.
Disable unused ports: configure unused switch ports in a 'parking' VLAN (unused VLAN not routed anywhere) and administratively shut them down. This prevents unauthorized devices from plugging into empty ports and gaining network access.
BPDU Guard and Root Guard: BPDU Guard disables ports that receive unexpected STP BPDUs (protects against rogue switches). Root Guard prevents external switches from becoming the STP root bridge. Both are hardening controls for the spanning tree process.
Disable DTP (Dynamic Trunking Protocol): automatically negotiates trunk ports — an attacker can exploit this to create unauthorized trunks. Disable DTP on all access ports by setting them explicitly to access mode and disabling negotiation.
Router and Device Hardening
Change default credentials: all network devices ship with default usernames and passwords — always change them on first deployment. Weak or default credentials are responsible for a large percentage of unauthorized access incidents.
Disable unused services and protocols: Telnet (use SSH instead), HTTP management (use HTTPS), CDP/LLDP (disable on external-facing interfaces), unnecessary routing protocols (disable RIP if using OSPF), and unused physical interfaces.
Secure management interfaces: configure management access through a dedicated out-of-band (OOB) management network or a management VLAN. Restrict management access by source IP using ACLs — only allow SSH/HTTPS from the management workstation subnet. Use SNMPv3 (with authentication and encryption) instead of SNMPv1/v2 (no encryption).
Firmware/IOS updates: keep network device firmware and OS current. Manufacturers regularly release security patches for vulnerabilities. Establish a patch management process for network infrastructure.
Network Access Control (NAC)
NAC (Network Access Control) evaluates endpoints before allowing network access. Policy enforcement: check if the connecting device has current AV signatures, OS patches, and is compliant with security policies before granting access. Non-compliant devices are quarantined to a remediation VLAN. 802.1X port-based authentication integrates with NAC — authenticate users and devices before granting switch port or wireless access.
802.1X components: Supplicant (the client device with 802.1X software), Authenticator (the switch or WAP that controls access), Authentication Server (RADIUS server that validates credentials). The authenticator acts as a proxy between the supplicant and RADIUS server.