Support & Integration

Chapter 7 — Core Switch Security Hardening Design Guide


Core switch security hardening does not operate in isolation. It depends on a set of supporting infrastructure systems that must be deployed, configured, and integrated before the hardening controls can function effectively. These supporting systems include authentication and authorization servers, time synchronization infrastructure, centralized logging and SIEM platforms, out-of-band management networks, configuration backup systems, and PKI certificate infrastructure. The absence or misconfiguration of any of these systems creates gaps in the hardening architecture that cannot be compensated by controls on the switch itself.

The integrated supporting infrastructure diagram below provides a unified view of all supporting systems and their relationships to the core switches. Each supporting system is connected to the core switches via the OOB management network (green connections), the production monitoring network (blue connections), or the authentication network (orange connections). Understanding these relationships is essential for planning the deployment sequence and ensuring that dependencies are resolved before hardening controls are activated.

7.1 Integrated Supporting Infrastructure Diagram

Integrated Supporting Infrastructure Diagram — All Supporting Systems Connected to Core Switches
Figure 7.1: Integrated Supporting Infrastructure — All Supporting Systems (AAA, NTP, Syslog/SIEM, OOB Management Switch, Config Backup, Jump Host, Telemetry Collector, PKI/CA) Connected to Core-SW-A and Core-SW-B via Color-Coded Management, Monitoring, and Authentication Connections

7.2 Supporting System Requirements

The following table defines the requirements for each supporting system, including the protocols used, redundancy requirements, and the hardening controls that depend on each system. Systems marked as "Critical" must be operational before any hardening controls that depend on them are activated.

Supporting SystemCriticalityProtocolRedundancyDependent ControlsFailure Impact
AAA Server (TACACS+/RADIUS)CriticalTACACS+ (TCP 49) or RADIUS (UDP 1812/1813)Primary + secondary; local fallback accountSSH/console authentication; command authorization; accountingManagement lockout if primary and secondary both fail
NTP ServerCriticalNTPv4 (UDP 123); NTPsec preferredPrimary + secondary; GPS-disciplined preferredSyslog timestamps; certificate validity; RPKI RTR; audit trailLog correlation failure; certificate validation errors; audit trail unreliable
Syslog / SIEM ServerCriticalSyslog over TLS (TCP 6514); RELP for reliable deliveryPrimary + secondary; local buffer on switchSecurity event logging; audit trail; compliance reportingSecurity events lost; compliance audit failure; incident response degraded
OOB Management SwitchCriticalEthernet (management VLAN); physically isolatedRedundant OOB switch; separate power feedAll management access; console server connectivity; emergency accessLoss of management access during production network failure
Console ServerHighRS-232 serial; SSH over OOB networkRedundant console server; cellular backupEmergency console access; password recovery; initial configurationNo console access during network failure; emergency recovery impaired
Jump Host / Bastion ServerHighSSH (TCP 22); HTTPS (TCP 443) for web-based accessPrimary + secondary jump host; MFA enforcedAll SSH/HTTPS management access; session recording; access controlManagement access requires direct OOB console; session recording lost
Config Backup ServerHighSCP/SFTP over OOB; Git-based version controlPrimary + offsite backup; encrypted storageConfiguration version control; rollback capability; change auditNo configuration rollback; change history lost; recovery time increased
SNMP / Telemetry CollectorMediumSNMPv3 (UDP 161/162); gRPC/gNMI (TCP 57400); NetFlow/IPFIXCollector cluster; local bufferPerformance monitoring; capacity planning; anomaly detectionPerformance visibility lost; capacity planning degraded; anomaly detection impaired
PKI / Certificate AuthorityMediumSCEP/EST for certificate enrollment; OCSP for validationRoot CA offline; issuing CA redundantHTTPS management; MACsec certificates; SSH host key verificationCertificate renewal failure; HTTPS management degraded; MACsec key rotation failure

7.3 AAA Integration Design

The AAA (Authentication, Authorization, and Accounting) system is the most critical supporting infrastructure for core switch security hardening. It provides centralized authentication for all management access, command-level authorization to enforce least-privilege access, and comprehensive accounting of all administrative actions. The design must account for failure scenarios to prevent management lockout while maintaining security during AAA server unavailability.

AAA FunctionProtocolConfiguration RequirementFailure Behavior
Authentication (Login)TACACS+ preferred; RADIUS fallbackPrimary server + secondary server; local account as last resortFall through to secondary; then local emergency account
Authentication (Enable/Privilege)TACACS+Separate AAA method list for privilege escalationLocal enable password as fallback
Command AuthorizationTACACS+ (command authorization)Per-privilege-level command lists; deny-all defaultIf AAA unavailable: permit (configurable) or deny all
Accounting (Commands)TACACS+All commands logged to TACACS+ server; local bufferCommands still executed; accounting queued for later delivery
Accounting (Sessions)TACACS+ / RADIUSSession start/stop logged; idle timeout enforcedSessions still permitted; accounting queued

7.4 Monitoring and Telemetry Integration

Effective monitoring integration requires configuring the core switch to export security-relevant events to the SIEM platform in real time. The following table defines the minimum set of events that must be logged and the recommended export method for each event category. Events marked as "Critical" must be exported in real time with no local buffering that could result in event loss.

Event CategoryCriticalityExport MethodRetentionAlert Threshold
Authentication failuresCriticalSyslog over TLS; real-time12 months5 failures in 60 seconds
Configuration changesCriticalSyslog over TLS; real-time; config diff to backup server24 monthsAny change outside maintenance window
BGP session state changesCriticalSyslog + SNMP trap; real-time12 monthsAny BGP session down event
CoPP drop eventsHighSNMP trap + streaming telemetry6 monthsCoPP drops >1000/min sustained
ACL permit/deny hitsHighSyslog (sampled for high-volume ACEs)6 monthsDeny hits on critical ACEs
Interface link stateHighSNMP trap + syslog6 monthsAny core interface down event
CPU/memory utilizationMediumSNMP polling (5-min interval) + streaming telemetry3 monthsCPU >80% sustained 5 min; memory >90%
Routing table changesMediumStreaming telemetry (gNMI); route count monitoring3 monthsRoute count change >10% in 5 minutes