Scenarios & Selection

Chapter 3 — Core Switch Security Hardening Design Guide


Core switch security hardening is not a one-size-fits-all discipline. The appropriate depth, scope, and specific controls depend heavily on the deployment scenario—the network type, business criticality, regulatory environment, threat model, and operational constraints. This chapter presents eight representative deployment scenarios, each with a real-world context, key technical parameters, selection criteria, and recommended hardening profile. Understanding which scenario most closely matches your environment is the first step in scoping the hardening effort correctly.

Each scenario is characterized by a set of primary technical indicators: throughput requirements, redundancy model, routing protocol complexity, management model, compliance requirements, and the dominant threat vectors. These indicators drive the selection of hardening depth (Baseline, Enhanced, or Advanced) and the prioritization of specific controls within each hardening domain.

Scenario 1: Hyperscale Data Center Core

Hyperscale Data Center Core Network — Spine-Leaf Architecture with Security Hardening
Figure 3.1: Hyperscale Data Center Core — Spine-Leaf Topology with Modular Chassis Core Switches, BGP/ECMP Routing, and CoPP-Protected Control Plane

Scenario Description

Large-scale data center environments operating spine-leaf or core/aggregation topologies with modular chassis switches (e.g., 400G/800G-capable platforms). These environments typically run BGP as the underlay routing protocol with ECMP for load balancing, and may use VXLAN/EVPN for overlay segmentation. The primary security concerns are control plane stability under high-volume traffic conditions, unauthorized management access, and configuration drift across large device counts.

Technical IndicatorSpecification
Switching Capacity400 Tbps+ per chassis; 400G/800G interfaces
Routing ProtocolBGP (iBGP/eBGP), ECMP, VXLAN/EVPN overlay
Redundancy ModelDual spine planes; MLAG or multi-chassis LAG to leaf
Management ModelDedicated OOB network; automation-driven config management (Ansible/Terraform)
CoPP PriorityBGP session protection; BFD stability; ICMP rate limiting
ComplianceSOC 2, ISO 27001, internal security policy
Hardening ProfileEnhanced to Advanced; GitOps config management; streaming telemetry
Primary Threat VectorsBGP route injection, control plane flooding, unauthorized API access, config drift

Scenario 2: Enterprise Campus Core

Enterprise Campus Core Network — Dual-Core Architecture with OSPF Routing and VLAN Segmentation
Figure 3.2: Enterprise Campus Core — Dual-Core Switches with MLAG Peer-Link, OSPF Routing, Structured Cabling, and NOC Monitoring

Scenario Description

University or enterprise campus networks with a collapsed or dual-core design, aggregating building distribution switches and providing L3 gateway services for campus VLANs. These environments typically run OSPF or EIGRP as the routing protocol, with STP for L2 redundancy at the distribution layer. The primary security concerns are unauthorized VLAN access, STP topology manipulation, rogue DHCP servers, and management access from campus workstations.

Technical IndicatorSpecification
Switching Capacity10–100 Tbps; 10G/25G/100G uplinks
Routing ProtocolOSPF or EIGRP; SVI-based L3 gateway for campus VLANs
Redundancy ModelDual core with MLAG or VSS/VSF stacking
Management ModelOOB or dedicated management VLAN; jump host preferred
L2 Hardening PriorityBPDU Guard, Root Guard, DHCP Snooping, DAI on all access-facing trunks
ComplianceInternal IT policy; FERPA (education); NIST CSF
Hardening ProfileBaseline to Enhanced; focus on L2 protections and AAA
Primary Threat VectorsRogue switch insertion, ARP spoofing, unauthorized VLAN access, management plane exposure

Scenario 3: Financial Services Critical Business Network

Financial Services Critical Business Network — High-Availability Core with Dual UPS and Security Operations Center
Figure 3.3: Financial Services Critical Business Network — HA Core Infrastructure with Dual Power Feeds, Physical Security Controls, and Compliance Monitoring

Scenario Description

Banking, trading, or financial services environments where network availability directly impacts revenue and regulatory compliance. These environments require the highest levels of redundancy, the most stringent access controls, and comprehensive audit trails. Every configuration change must be approved, logged, and reversible. The primary security concerns are unauthorized access, configuration tampering, and any control plane disruption that could affect trading systems or payment processing.

Technical IndicatorSpecification
Availability Target99.999% (five nines); <1 minute annual downtime
Redundancy ModelDual active/active core; dual power feeds from separate PDUs; dual supervisors
Change Management4-eyes approval; maintenance window required; automated rollback on failure
AAA RequirementTACACS+ with command authorization; MFA mandatory; session recording
Audit RequirementsAll commands logged; config change alerts to SOC; 12-month log retention
CompliancePCI-DSS, SOX, SWIFT CSP, local financial regulator requirements
Hardening ProfileAdvanced; all eight domains at maximum depth; quarterly penetration testing
Primary Threat VectorsInsider threat, supply chain compromise, APT targeting financial infrastructure

Scenario 4: Government and Critical Infrastructure

Government Critical Infrastructure Network — TEMPEST-Rated Facility with Physical Security and Compliance Audit Dashboard
Figure 3.4: Government Critical Infrastructure — TEMPEST-Rated Secure Facility with Air-Gap Segments, Physical Port Controls, and Compliance Audit Monitoring

Scenario Description

Government agencies, defense networks, and critical national infrastructure (CNI) operators where network security is a national security matter. These environments may require TEMPEST-rated equipment, air-gap segments, physical port blocking, and compliance with government-specific security frameworks. The hardening baseline must align with graded protection requirements and may require formal security assessment and certification.

Technical IndicatorSpecification
Physical SecurityBiometric access, CCTV, tamper-evident seals, port blockers, cable locks
Network SegmentationHard air gaps or one-way data diodes between classification levels
Cryptographic RequirementsGovernment-approved algorithms; MACsec for sensitive links; PKI with government CA
Management ModelDedicated classified management network; no internet-connected management paths
Audit RequirementsReal-time SIEM with government-approved platform; immutable log storage; chain of custody
ComplianceMLPS (China), FISMA/FedRAMP (US), NCSC Cyber Essentials Plus (UK), ISO 27001
Hardening ProfileAdvanced + government-specific controls; formal security assessment required
Primary Threat VectorsNation-state APT, insider threat, supply chain compromise, physical tampering

Scenario 5: Manufacturing and Industrial OT/IT Convergence

Manufacturing OT/IT Convergence — Security Demarcation Zone Between SCADA/PLC Network and IT Core Network
Figure 3.5: Manufacturing OT/IT Convergence — Security Demarcation Zone with Labeled OT (SCADA/PLC) and IT Core Network Segments, Production Monitoring Integration

Scenario Description

Smart manufacturing environments where IT and OT networks are converging to enable Industry 4.0 capabilities. The core switch sits at the IT/OT boundary, enforcing strict segmentation between the production network (SCADA, PLCs, industrial controllers) and the enterprise IT network. Any security failure at this boundary can impact production safety, product quality, and regulatory compliance for industrial control systems.

Technical IndicatorSpecification
Segmentation ModelStrict VLAN/VRF separation between OT and IT; firewall at demarcation zone
OT Protocol AwarenessDeep packet inspection for Modbus/DNP3/EtherNet/IP at demarcation firewall
Availability PriorityProduction continuity over security patching; maintenance windows aligned with production schedules
Change ManagementExtended approval process; OT safety review required for any change affecting production VLANs
MonitoringSeparate OT security monitoring (Claroty/Dragos/Nozomi) integrated with IT SIEM
ComplianceIEC 62443, NERC CIP (energy sector), ISA/IEC standards
Hardening ProfileEnhanced; focus on segmentation enforcement and change management rigor
Primary Threat VectorsLateral movement from IT to OT, ransomware targeting production systems, supply chain attacks

Scenario 6: Healthcare Network

Healthcare Network — Medical-Grade Core Switches with Clinical and Administrative VLAN Segmentation, HIPAA Compliance Monitoring
Figure 3.6: Healthcare Network — Medical-Grade Core Infrastructure with Clinical/Administrative Segmentation, HIPAA Compliance Dashboard, and Patient Data Protection Controls

Scenario Description

Hospital and healthcare system networks connecting clinical systems (PACS, EMR, medical devices, infusion pumps) with administrative and guest networks. Patient data protection and medical device availability are the primary concerns. The core switch must enforce strict segmentation between clinical, administrative, and guest networks while maintaining the high availability required for life-critical systems. Medical device networks often cannot be patched or hardened directly, making the core switch the primary enforcement point.

Technical IndicatorSpecification
Network SegmentationSeparate VLANs/VRFs for clinical, administrative, guest, and medical device networks
Medical Device ConstraintsMany devices cannot be patched; core switch ACLs provide compensating controls
Availability PriorityClinical network availability is life-critical; security changes require clinical impact assessment
Wireless IntegrationMedical-grade wireless (802.11ax) with separate SSIDs per network segment
Audit RequirementsPHI access logging; 6-year log retention; breach notification capability
ComplianceHIPAA/HITECH, NIST SP 800-66, FDA cybersecurity guidance for medical devices
Hardening ProfileEnhanced; focus on segmentation, access control, and PHI audit trail
Primary Threat VectorsRansomware targeting clinical systems, medical device exploitation, PHI exfiltration

Scenario 7: Cloud Service Provider / Multi-Tenant Data Center

Cloud Service Provider Multi-Tenant Data Center — Tenant Cage Separation with Meet-Me-Room Core and VRF-Based Tenant Isolation
Figure 3.7: Cloud Service Provider / Multi-Tenant Data Center — Tenant Cage Separation, Meet-Me-Room Core Infrastructure, Multi-Tenant VRF Routing, and Security Audit Log Isolation Verification

Scenario Description

Colocation facilities and cloud service providers hosting multiple customers on shared infrastructure. The core switch must enforce strict tenant isolation using VRF, VLAN, and ACL controls while providing high-performance forwarding for all tenants simultaneously. Any security failure that allows cross-tenant traffic leakage is a critical incident with contractual and regulatory consequences. The management plane must be strictly isolated from tenant networks.

Technical IndicatorSpecification
Tenant IsolationPer-tenant VRF with no route leakage; ACL enforcement at all tenant handoff points
Routing ScaleFull Internet routing table (900K+ routes) for transit/peering tenants; TCAM planning critical
BGP SecurityBGP RPKI for route origin validation; prefix filtering; GTSM on eBGP sessions
Management IsolationManagement VRF completely isolated from all tenant VRFs; no route leakage possible
Audit RequirementsPer-tenant security event logging; tenant-accessible compliance reports; SLA evidence
ComplianceSOC 2 Type II, ISO 27001, PCI-DSS (for payment-processing tenants), CSA STAR
Hardening ProfileAdvanced; focus on tenant isolation verification and BGP security
Primary Threat VectorsCross-tenant traffic leakage, BGP route hijacking, management plane compromise affecting all tenants

Scenario 8: WAN Hub and Branch Aggregation

WAN Hub and Branch Aggregation — Core Switch Aggregating MPLS, SD-WAN, and Internet WAN Links with BGP Security Hardening
Figure 3.8: WAN Hub and Branch Aggregation — Core Switch Aggregating Multiple WAN Links (MPLS/SD-WAN/Internet) with BGP Authentication, CoPP Policy Application, and OOB Management Access

Scenario Description

Enterprise WAN hub sites or regional headquarters where the core switch aggregates multiple WAN links (MPLS, SD-WAN, internet) and provides routing to branch offices. These environments face unique security challenges because the WAN interfaces are exposed to provider networks and potentially the internet, making BGP security, prefix filtering, and control plane protection especially critical. The OOB management path is particularly important because WAN link failures can isolate the device from in-band management.

Technical IndicatorSpecification
WAN Link TypesMPLS (primary), SD-WAN (secondary), internet (tertiary/backup)
Routing ProtocolBGP for WAN; OSPF/EIGRP for LAN; route redistribution with prefix filtering
BGP SecurityMD5/SHA authentication on all BGP sessions; prefix filtering; max-prefix limits
OOB Management4G/LTE OOB management for emergency access when all WAN links fail
CoPP PriorityBGP session protection; prevent CPU exhaustion from WAN-sourced traffic
ComplianceInternal IT policy; industry-specific requirements for branch operations
Hardening ProfileEnhanced; focus on BGP security, WAN interface hardening, and OOB management
Primary Threat VectorsBGP route injection from provider, WAN-sourced control plane attacks, management lockout during WAN failure

3.9 Scenario-to-Hardening Profile Mapping

The following table provides a consolidated mapping from deployment scenario to recommended hardening profile, priority domains, and key selection criteria. Use this table as a starting point for scoping the hardening effort for your specific environment.

ScenarioHardening ProfilePriority DomainsKey Selection Criteria
Hyperscale Data CenterEnhanced–AdvancedCoPP, Config Lifecycle, HA ConsistencyBGP scale, automation integration, streaming telemetry
Enterprise CampusBaseline–EnhancedL2 Hardening, AAA, Mgmt AccessVLAN count, STP topology, user density
Financial ServicesAdvancedAll 8 domains at maximum depthAvailability SLA, compliance framework, audit requirements
Government/CNIAdvanced + Gov-specificPhysical security, Cryptography, SegmentationClassification level, government framework, formal assessment
Manufacturing OT/ITEnhancedSegmentation, Change Management, OT awarenessOT protocol types, production impact tolerance, IEC 62443
HealthcareEnhancedSegmentation, Access Control, PHI AuditMedical device constraints, HIPAA requirements, clinical impact
Cloud/Multi-TenantAdvancedTenant Isolation, BGP Security, Mgmt IsolationTenant count, routing scale, SLA requirements
WAN Hub/BranchEnhancedBGP Security, CoPP, OOB ManagementWAN link types, branch count, OOB availability