Network Security Fundamentals

Security is not an afterthought; it is built into the network design. From firewalls to VPNs, defense in depth is key.

1. The CIA Triad

Every security decision balances these three pillars:

2. Firewalls: Packet Filtering vs Stateful

A firewall sits at the perimeter (or internally) to enforce policy.

Standard vs Extended ACLs (Cisco Syntax)

Type Range Features Placement
Standard 1-99 Source IP only. Close to Destination.
Extended 100-199 Source, Destination, Protocol, Port. Close to Source (Drop early).

3. VPNs (Virtual Private Networks)

VPNs extend a private network across a public network (Internet) using tunneling (GRE/IPsec) and encryption.

Engineer's Notebook: IPsec IKE Phases

Phase 1 (IKE SA): Authenticate peers (Pre-Shared Key / Certs) and negotiate encryption for the management channel. (UDP 500).

Phase 2 (IPsec SA): Negotiate encryption for the actual data traffic (ESP/AH). (Protocol 50).

Troubleshooting Tip: "Phase 1 is up, Phase 2 is down" usually means a mismatch in the crypto map (ACLs or Transform Sets).

4. Historical Security Failures

5. Common Network Attacks