Beginner ⏱ 45 Minutes Prereq: Module 05 & 06

Network Devices

To defend a network, you must know the hardware. Learn the structured role of Routers, Switches, Firewalls, and more.

1. The Router

What Is It?

The digital postmaster that connects different networks together.

Problem It Solves

Allows your home devices to talk to the outside world (Internet).

Home Devices
Switch
Router
Internet/ISP

📍 Usually placed between your internal network and your Internet Service Provider (ISP).

How It Works

It reads the IP Address on a packet and sends it to the best path to reach its destination. It chooses the best path using something called a routing table (a list of known network paths).

Real-Life Example

Sending a letter to a friend in another country. The local post office sorts it and sends it to the international terminal.

What Happens If It Fails?

  • The entire building loses Internet access.
  • Internal devices can still talk to each other, but not outside.

🛡️ Security Mindset

In small networks, routers may act as the first line of defense. In larger networks, firewalls usually handle security.

Common Confusion

  • Router connects networks using IP addresses.
  • Switch connects devices inside a network using MAC addresses.
Launch Router Simulator

✅ Quick Check

  • Does a Router use MAC addresses or IP addresses? (Answer: IP)
  • Does it connect devices inside a room, or connect networks? (Answer: Networks)

2. The Switch

What Is It?

A smart power strip for data that connects devices within a single network.

Problem It Solves

Stops data collisions by creating a direct line between two devices.

PC A
Switch
Printer

📍 Usually placed inside your office/home connecting PCs and printers.

How It Works

It uses MAC Addresses to learn where devices are plugged in. It stores these addresses in something called a MAC table so it remembers where devices are connected.

Real-Life Example

Passing a note to a specific person in a classroom, rather than shouting it to the whole room.

What Happens If It Fails?

  • Devices in the office/home cannot talk to each other.
  • You cannot print or share files locally.

🛡️ Security Mindset

Hackers try to "flood" switches to make them fail and act like a Hub (broadcasting all data), allowing them to steal passwords.

Launch Switch Simulator

✅ Quick Check

  • Does a Switch use IP or MAC? (Answer: MAC)
  • Does it connect to the internet directly? (Answer: No, it connects to a Router)

3. The Firewall

What Is It?

A security guard that approves or denies traffic based on rules.

Problem It Solves

Prevents hackers and unauthorized connections from entering your network.

Internet
Firewall
Internal Network

📍 Usually placed between the Internet and your internal network.

How It Works

It checks a list of rules (Ex: "Block Port 23"). Rules are processed in order. The first matching rule decides what happens.

Real-Life Example

A bouncer at a club checking IDs against a guest list.

What Happens If It Fails?

  • If it fails "Open": Anyone can enter (Dangerous).
  • If it fails "Closed": No one can enter or leave (No Internet).

🛡️ Security Mindset

A misconfigured firewall is the #1 way hackers get in. Default policy should always be "Block All" unless needed.

Launch Logic Sim Launch Pro Sim

✅ Quick Check

  • What does "Stateful" mean? (Answer: Remembers connections)
  • Should the default rule be Allow or Deny? (Answer: Deny)

4. IDS (Intrusion Detection System)

What Is It?

A burglar alarm that watches network traffic.

Problem It Solves

Detects stealthy attacks that might have slipped past the firewall.

Traffic Copy
IDS (Passive)

📍 Placed near the firewall to monitor or block malicious traffic.

How It Works

It compares traffic against a database of known attack "signatures." If it sees a match, it sends an alert.

Real-Life Example

A security camera recording a break-in. It sees the crime, but cannot physically stop the thief.

What Happens If It Fails?

  • Attacks happen without you knowing.
  • Traffic still flows normally (it sits on the side).
Launch IDS Simulator

✅ Quick Check

  • Does an IDS stop the attack? (Answer: No, it alerts)
  • Does it sit directly in the path of traffic? (Answer: No, usually passive)

5. IPS (Intrusion Prevention System)

What Is It?

An armed guard that stops attacks instantly.

Problem It Solves

Automatically blocks malicious traffic before it reaches the server.

Internet
IPS (Inline)
Server

📍 Placed near the firewall to monitor or block malicious traffic.

How It Works

It sits inline (in the middle). If it detects an attack, it drops the packet immediately.

IDS vs IPS (Quick Comparison)

IDS = Alarm (Detects).
IPS = Guard (Detects + Blocks).

Real-Life Example

A guard dog that bites an intruder trying to jump the fence.

What Happens If It Fails?

  • If it breaks, internet connection is lost (because it sits in the middle).
  • It might block legitimate users by mistake (False Positive).

✅ Quick Check

  • Does an IPS stop the attack? (Answer: Yes)
  • What is the risk? (Answer: Blocking real users)

6. Proxy Server

What Is It?

A middleman that makes requests on your behalf.

Problem It Solves

Hides your identity or filters what websites you can visit.

You
Proxy
Website

📍 Can sit between users and the internet (forward proxy) or between internet and servers (reverse proxy).

How It Works

You talk to the proxy. The proxy talks to the website. The website only sees the proxy, not you.

Real-Life Example

A lawyer speaking for a client in court. The client doesn't speak directly to the judge.

What Happens If It Fails?

  • You cannot access the websites the proxy was handling.
  • Your real IP might be exposed if you bypass it.

🛡️ Security Mindset

Hackers use proxies to hide their location when attacking. Companies use them to inspect employee traffic.

Launch Proxy Simulator

✅ Quick Check

  • Does the website see your IP address? (Answer: No)
  • Can a proxy block websites? (Answer: Yes)

7. The Traffic Journey

When you request a website, your data travels through these devices in order:

Your Laptop
Switch
Router
Firewall
Internet

The Switch moves data out of your room. The Router moves it out of the building. The Firewall checks it for safety before it leaves.

📌 Recap

  • Router: Connects Networks (IP).
  • Switch: Connects Devices (MAC).
  • Firewall: The Gatekeeper (Allow/Deny).
  • IDS: The Camera (Alerts).
  • IPS: The Guard (Blocks).
  • Proxy: The Middleman (Hides Identity).