Episode 17 — Secure Routing and Switching Fundamentals

Routing and switching form the circulatory system of any network, and understanding them is key to securing data in transit. This episode explains how routers move packets across networks using routing tables, metrics, and protocols like OSPF and BGP, while switches handle local forwarding based on MAC addresses. You’ll learn how security fits in at each layer—from hardening control planes to securing management interfaces and preventing rogue device insertion. The discussion also covers how route leaks, spoofing, and broadcast storms can expose weaknesses if default configurations are left unchecked.
Listeners will gain a sense of how topology choices influence security posture. We explore VLAN trunking, spanning tree considerations, and access port best practices that prevent common lateral-movement techniques. The episode provides insight into why secure network design begins with predictable, minimal paths, and how to build redundancy without opening backdoors. By linking routing logic to threat models, you’ll understand how to interpret exam scenarios and real incidents involving misrouted traffic, ARP poisoning, or weak segmentation boundaries. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 17 — Secure Routing and Switching Fundamentals
Broadcast by