π§ Day 4: Routes, Ports, Protocols & Switchcraft β Diving Deeper into Networking

I have a strong and evolving interest in cybersecurity and ethical hacking, proven by my top 1% rank on TryHackMe, completion of SOC Fundamentals, multiple Udemy courses, and active participation in CTF programs and practical hacking series. Currently, I work as a Cybersecurity Associate at Sattrix Information Security, where I serve as an ArcSight Administrator and have hands-on experience with SIEM tools like Splunk and NewEvol.
Alongside cybersecurity, I also have a background in web development with experience in HTML, CSS, JavaScript, and Python scripting. Iβm deeply committed to continuous learning and real-world application, with a consistent track record of completing certifications and challenges. Despite ongoing health challenges that impact productivity, I remain focused on deepening my expertise and building a successful career in cybersecurity and ethical hacking.
Welcome back, tech enthusiasts! π
Day 4 of my networking expedition took me deep into the heart of what makes our digital world run smoothly: routing, well-known ports, protocols, and some serious switch magic like VLANs, STP, and Port Mirroring.
Letβs break it down in a way that feels like youβre sipping chai while debugging a router (relatable, right?). βπ οΈ
π§ Routes: Your Network's GPS
Imagine sending a letter β it needs a path to get to its destination. Thatβs exactly what routing does in networking: it defines the way data packets travel from source to destination.
π£οΈ Types of Routing
π Static Routing
Manually configured, straightforward.
Best for small networks or when you want full control.
Cisco Example:
Router(config)# ip route 192.168.2.0 255.255.255.0 192.168.1.1
π Default Routing
Like telling your network, βIf you donβt know where to go, ask this guy.β
Uses
0.0.0.0 0.0.0.0as a catch-all.
π€ Dynamic Routing
Think of it like GPS that updates based on traffic.
Routers exchange info to find the best path automatically.
Used in larger, constantly changing networks.

π Well-Known Ports: Digital Doorways
Ports are like doors in your systemβs buildingβsome are wide open, some locked, and some only open to specific people.
| Port | Service | Protocol |
| 22 | SSH β Secure Remote Access | TCP |
| 80 | HTTP β Web Traffic | TCP |
| 443 | HTTPS β Secure Web | TCP |
| 53 | DNS β Internet Name Lookup | TCP/UDP |
| 25 | SMTP β Sending Emails | TCP |
| 110 | POP3 β Retrieving Emails | TCP |
| 161 | SNMP β Monitoring Devices | UDP |
| 3389 | RDP β Remote Desktop | TCP |
These are just a few. Knowing them is vital for firewalls, pentesting, or troubleshooting.
π TCP vs UDP: The Reliability Showdown
| Feature | TCP | UDP |
| Connection | Reliable (Handshake) | No connection |
| Speed | Slower | Faster |
| Error Handling | Yes | Minimal |
| Use Cases | Web, Email, File Transfer | Streaming, VoIP, Gaming |
In short:
TCP = βLetβs talk properly.β π
UDP = βYOLO, just send it.β π
π΅οΈββοΈ Packet Analyzer β Like X-ray Vision for Networks
Tools like Wireshark let you peek inside network packets.
You can:
See whoβs talking to whom.
Check what protocols are in use.
Spot suspicious or faulty traffic.
Itβs essential for security pros and curious nerds alike.
π§© VLANs β Virtual Party Rooms
A VLAN (Virtual Local Area Network) lets you segment your physical network into logical groups.
Devices can behave like theyβre on the same network, even if theyβre not.
Reduces broadcast traffic.
Helps in organizing departments (HR, Finance, etc.).
π§± Think of it like giving each team their own invisible room in the same office.
π Trunking VLANs β One Cable, Many Channels
Trunking allows multiple VLANs to share a single network connection.
Uses 802.1Q tags to mark VLAN info on packets.
If a packet has no tag, it goes to the Native VLAN.
Efficient, elegant, and neat.
π² STP β Saving Networks from Loops
Spanning Tree Protocol prevents your switches from creating loop nightmares.
Here's how it works:
π Root Bridge Election β Lowest Bridge ID wins.
π£οΈ Path Cost Calculation β Lower is better.
π― Port Roles β Root, Designated, or Blocked.
π State Transitions β Ports go from Blocking β Listening β Learning β Forwarding.
π© BPDU Exchange β Like switch gossip to keep everyone updated.
Without STP, your network might collapse into a looping black hole. π
π§βπ» Managing Switches β Like Being the Network DJ
π οΈ Console Access
- Physical port to connect directly for setup/recovery.
π Remote Access
Assign IP & Default Gateway.
Use VTY lines (SSH/Telnet) for remote control.
π Security
- User accounts, strong passwords, and AAA (Authentication, Authorization, Accounting) ensure only legit users mess with your switches.
π Port Bonding β Because One Cable is Never Enough
Using LACP (Link Aggregation Control Protocol):
Combines multiple ports into one logical link.
Benefits?
Increased bandwidth.
Redundancy (failover).
Easy management.
Think of it as switch teamwork. π
π Port Mirroring β Network Surveillance Mode
Want to monitor traffic without disrupting it? Use Port Mirroring.
Copies traffic from one port/VLAN to another.
Connects to IDS/packet analyzers like Wireshark.
π‘οΈ Supports:
Local mirroring (same switch).
RSPAN (remote switch).
ERSPAN (encapsulated across networks).
Perfect for debugging or catching intrusions red-handed.
π― Final Thoughts
Day 4 was a deep dive into the essential nuts and bolts of networking. From routing your packets and identifying key ports, to designing efficient switch topologies and mirroring traffic like a proβIβve unlocked a new level of network wizardry! π§ββοΈ
If youβve made it this farβcongrats, you now know more than half the planet about how networks actually work. ππ‘



