CISSP · · 4 min read

Secure Routing, Switching, and Network Services: Hardening the Core

Routing, switching, DNS, DHCP, and NTP quietly run your network. Learn how to harden these core services so attackers cannot silently redirect or disrupt traffic.

Hook / Why this matters

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Routing, switching, DNS, DHCP, and other core services are the circulatory system of your network. If attackers can tamper with them, they can redirect, intercept, or disrupt almost any communication. Yet these components are often treated as performance or reliability concerns rather than security priorities.

Core concept explained simply

Secure routing and switching ensure that traffic flows where it should and nowhere else. Secure network services such as DNS, DHCP, and NTP ensure that devices can find each other and keep time accurately without exposing unnecessary risk.

Routing basics and risks

Routing determines how packets move between networks.

Risks include:

Inside an enterprise, misconfiguration is the main risk. On the public internet, BGP hijacking can affect traffic between networks globally.

Securing routing protocols

Many routing protocols support authentication and integrity checks.

Enabling authentication for internal dynamic routing reduces the risk of rogue devices participating in routing decisions.

Switching features relevant to security

Switches operate at Layer 2 but offer features that impact security:

Misconfigured trunks can expose sensitive VLANs on ports where they are not needed. Unrestricted access ports make it easier for attackers to connect rogue devices.

DNS and DHCP as critical services

DNS and DHCP underpin basic connectivity:

Attacks on these services can:

Hardening DNS, DHCP, and NTP

Good practices for core services include:

Secure, redundant services reduce both security and availability risks.

CISSP lens

For Domain 4, you should be able to:

Exam questions may describe symptoms such as misdirected traffic, unexpected IP assignments, or intermittent failures. Think about whether routing, switching, or core services are being abused or misconfigured.

Real-world scenario

A regional ISP misconfigured BGP announcements, accidentally advertising routes for a large enterprise's IP ranges as its own. Upstream providers accepted these announcements.

As a result:

This was not a targeted attack but a reminder that routing errors, whether malicious or accidental, can have large effects.

Within the enterprise's internal network, a separate issue arose. A misconfigured switch allowed a rogue DHCP server to run on a user VLAN, handing out addresses that pointed clients to an attacker controlled DNS server. This allowed targeted phishing and credential harvesting.

The organization responded by:

These changes did not eliminate all routing risks, especially on the public internet, but they greatly improved internal resilience and control.

Common mistakes and misconceptions

Frequent issues include:

A CISSP should encourage using built in security features and designing for both resilience and security.

Actionable checklist

To harden routing, switching, and core services:

Key takeaways

Optional exam-style reflection question

Why is it important to enable authentication on internal dynamic routing protocols like OSPF, and what risk does this reduce?

Answer: Authentication prevents unauthorized devices from participating in the routing protocol. Without it, an attacker on the internal network could inject false routes, redirecting traffic through their device or blackholing it. Authenticating routing updates reduces the risk of route manipulation and traffic interception.

Read next

© 2025 Threat On The Wire. All rights reserved.