Lesson 1 of 6

AI in Network Security Landscape

Objective

This lesson introduces how AI transforms network security by feeding telemetry (logs, flows, SNMP) into AI/ML systems for improved detection, prioritization, and automated response. You will configure a simple lab network to export syslog, NetFlow, and SNMP to a central SIEM/AI engine (SIEM1). In production, this is how security teams provide rich telemetry to ML pipelines so anomalies and threats can be detected and correlated across domains; for example, by combining flow anomalies with firewall policy changes to prioritize a true incident.

Real-world scenario: An enterprise uses an AI-enabled SIEM/XDR to reduce alert noise and speed up incident response. The network devices must reliably send time-stamped logs, flow records, and SNMP telemetry to the AI system so the ML models can learn baseline behavior, detect anomalies, and recommend automated actions.


Topology & Device Table

ASCII topology (all IPs shown on each interface):

R1 and SW1 form the access layer; R1 connects to the security/telemetry network where the firewall and SIEM/AI engine reside. PC1 is a test host.

Network Topology Diagram

Device Table

DeviceInterfaceIP AddressSubnet MaskRole
R1GigabitEthernet0/110.0.10.1255.255.255.0Default gateway for access VLAN; NetFlow & Syslog exporter
R1GigabitEthernet0/0192.168.1.1255.255.255.0Uplink to security/telemetry network
SW1Vlan1 (management)10.0.10.2255.255.255.0Access switch management
SW1GigabitEthernet0/1(connected to PC1)N/AAccess port
FW1eth0 (toward R1)192.168.1.2255.255.255.0Firewall inline to security network
SIEM1eth0192.168.1.100255.255.255.0AI/SIEM/XDR server (collects logs, flows, SNMP)
PC1eth010.0.10.10255.255.255.0Test endpoint

Key Concepts (before hands-on)

  • Telemetry types and protocol behavior

    • Syslog: devices send log messages via UDP/514 (commonly) to a collector; logs must be time-stamped (NTP) to correlate events across the network. In production, malformed timestamps break ML baselining—accurate times are critical.
    • NetFlow / IPFIX: flow records summarize conversations (src/dst, ports, bytes); collectors receive UDP exports (e.g., UDP/2055). ML uses flows to detect anomalies such as unusual volumes, scanners, or lateral movement.
    • SNMP: SNMP polling/traps provide device health and counters; polling gives periodic metrics (CPU, interface counters) while traps alert on events. The AI uses these metrics for baselining and resource-related anomalies.
  • Why normalization and enrichment matter
    Raw logs/flows are noisy. The SIEM normalizes fields (timestamps, IPs, hostnames) and enriches events (DNS lookups, asset tags). AI models require consistent schemas to compare behavior across devices and services.

  • Data fidelity and sampling considerations
    High-volume telemetry (full NetFlow) can overwhelm collectors; sampling may be used. In production, tuning sampling rates and retention balances detection effectiveness against storage/egress costs.

  • Automation and feedback loop
    AI-driven systems often produce prioritized alerts and automated playbooks (e.g., block an IP at the firewall). Network devices must provide APIs or integrations (syslog for context; SNMP/REST for state changes) so automated responses are reliable and auditable.

  • Security of telemetry
    Telemetry channels should be protected (TLS, VPNs) for confidentiality and integrity in production. Unsigned/unprotected telemetry exposes sensitive metadata.


Step-by-step configuration

Step 1: Base device identity and management addressing

What we are doing: Set hostnames, management IPs and a domain so telemetry records include meaningful device identity. This helps the AI correlate events to devices and reduces ambiguity in the dataset.

R1> enable
R1# configure terminal
R1(config)# hostname R1
R1(config)# ip domain-name lab.nhprep.com
R1(config)# enable secret Lab@123
R1(config)# interface GigabitEthernet0/1
R1(config-if)# ip address 10.0.10.1 255.255.255.0
R1(config-if)# no shutdown
R1(config-if)# exit
R1(config)# interface GigabitEthernet0/0
R1(config-if)# ip address 192.168.1.1 255.255.255.0
R1(config-if)# no shutdown
R1(config-if)# exit
R1(config)# exit

SW1> enable
SW1# configure terminal
SW1(config)# hostname SW1
SW1(config)# interface Vlan1
SW1(config-if)# ip address 10.0.10.2 255.255.255.0
SW1(config-if)# no shutdown
SW1(config-if)# exit
SW1(config)# exit

What just happened: Setting the hostname and domain places a stable identifier in logs and flow metadata. Assigning management IPs allows the SIEM and administrators to reach devices for polling and collection. The enable secret secures privileged exec access.

Real-world note: Consistent hostnames and an internal domain (lab.nhprep.com) let AI correlation use a single canonical identity for each device.

Verify:

R1# show running-config | include hostname
hostname R1
R1# show ip interface brief
Interface                  IP-Address      OK? Method Status                Protocol
GigabitEthernet0/0        192.168.1.1     YES manual up                    up
GigabitEthernet0/1        10.0.10.1       YES manual up                    up

SW1# show running-config | include hostname
hostname SW1
SW1# show ip interface brief
Interface              IP-Address      OK? Method Status                Protocol
Vlan1                  10.0.10.2       YES manual up                    up
GigabitEthernet0/1     unassigned      YES unset  up                    up

Step 2: Configure NTP so logs/flows have accurate timestamps

What we are doing: Point devices to the SIEM for NTP. Correct timestamps are essential for ML models that build temporal baselines and correlate cross-device events.

R1# configure terminal
R1(config)# ntp server 192.168.1.100
R1(config)# exit

SW1# configure terminal
SW1(config)# ntp server 192.168.1.100
SW1(config)# exit

What just happened: Devices will synchronize clocks to the SIEM NTP server (192.168.1.100). With synchronized time, syslog messages and flow timestamps align across sources, which prevents time-skewed correlations.

Real-world note: In production, use dedicated, redundant NTP servers (and authenticated NTP) to prevent spoofing or clock drift affecting detection.

Verify:

R1# show ntp associations
     address         ref clock     st  when  poll reach  delay  offset   disp
*~192.168.1.100    .GPS.           1   12    64   377   0.123  -0.004  0.020

SW1# show ntp status
Clock is synchronized, stratum 2, reference is 192.168.1.100
nominal freq is 250.0000 Hz, precision is 2**18

Step 3: Configure Syslog to the SIEM (UDP/514)

What we are doing: Send device syslog messages to the central SIEM so logs feed the AI pipeline for anomaly detection and alert enrichment.

R1# configure terminal
R1(config)# logging host 192.168.1.100
R1(config)# logging trap informational
R1(config)# service timestamps log datetime msec localtime show-timezone
R1(config)# exit

SW1# configure terminal
SW1(config)# logging host 192.168.1.100
SW1(config)# logging trap informational
SW1(config)# service timestamps log datetime msec localtime show-timezone
SW1(config)# exit

What just happened: Each device will forward syslog messages (severity informational and above) to the SIEM at 192.168.1.100. The timestamp format is set to include milliseconds and time zone — improving temporal precision for ML.

Real-world note: In production, consider TLS-encrypted syslog or a syslog-ng forwarder to protect logs in transit.

Verify:

R1# show running-config | include logging
 logging host 192.168.1.100
 logging trap informational
R1# show logging
Syslog logging: enabled (0 messages dropped, 0 messages rate-limited, 0 flushes, 0 overruns, xml disabled)
    Console logging: disabled
    Monitor logging: level debugging, 0 messages logged
    Buffer logging: disabled
    Exceptions logging: disabled
    Discriminator logging: disabled
    Default logging origin: R1.lab.nhprep.com
    Syslog logging host: 192.168.1.100
    Trap logging level: informational

SW1# show logging
Syslog logging: enabled
    Syslog logging host: 192.168.1.100
    Trap logging level: informational


<div class="topology-diagram">
<img src="data:image/svg+xml;base64,<?plantuml 1.2026.1?><svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" contentStyleType="text/css" data-diagram-type="DESCRIPTION" height="619px" preserveAspectRatio="none" style="width:306px;height:619px;background:#FAFAFA;" version="1.1" viewBox="0 0 306 619" width="306px" zoomAndPan="magnify"><title>Lab 60: AI-Driven Network Security</title><defs/><g><rect fill="#FAFAFA" height="619" style="stroke:none;stroke-width:1;" width="306" x="0" y="0"/><g class="title" data-source-line="8"><text fill="#000000" font-family="sans-serif" font-size="14" font-weight="bold" lengthAdjust="spacing" textLength="278.7695" x="10" y="22.9951">Lab 60: AI-Driven Network Security</text></g><!--cluster Lab Modules--><g class="cluster" data-qualified-name="Lab Modules" data-source-line="10" id="ent0002"><path d="M23.3848,43.2969 L123.8135,43.2969 A3.75,3.75 0 0 1 126.3135,45.7969 L133.3135,65.5938 L288.3848,65.5938 A2.5,2.5 0 0 1 290.8848,68.0938 L290.8848,609.5769 A2.5,2.5 0 0 1 288.3848,612.0769 L23.3848,612.0769 A2.5,2.5 0 0 1 20.8848,609.5769 L20.8848,45.7969 A2.5,2.5 0 0 1 23.3848,43.2969" fill="none" style="stroke:#000000;stroke-width:1.5;"/><line style="stroke:#000000;stroke-width:1.5;" x1="20.8848" x2="133.3135" y1="65.5938" y2="65.5938"/><text fill="#000000" font-family="sans-serif" font-size="14" font-weight="bold" lengthAdjust="spacing" textLength="99.4287" x="24.8848" y="58.292">Lab Modules</text></g><!--entity AI_in_Network_Security_La--><g class="entity" data-qualified-name="Lab Modules.AI_in_Network_Security_La" data-source-line="11" id="ent0003"><rect fill="#E8F4FD" height="36.2969" rx="2.5" ry="2.5" style="stroke:#2563EB;stroke-width:0.5;" width="237.9229" x="36.9248" y="78.2969"/><text fill="#1E3A5F" font-family="sans-serif" font-size="14" lengthAdjust="spacing" textLength="217.9229" x="46.9248" y="101.292">AI in Network Security Landsca</text></g><!--entity MLBased_Threat_Detection--><g class="entity" data-qualified-name="Lab Modules.MLBased_Threat_Detection" data-source-line="12" id="ent0004"><rect fill="#E8F4FD" height="36.2969" rx="2.5" ry="2.5" style="stroke:#2563EB;stroke-width:0.5;" width="210.6816" x="50.5448" y="174.5969"/><text fill="#1E3A5F" font-family="sans-serif" font-size="14" lengthAdjust="spacing" textLength="190.6816" x="60.5448" y="197.592">ML-Based Threat Detection</text></g><!--entity Encrypted_Traffic_Analyti--><g class="entity" data-qualified-name="Lab Modules.Encrypted_Traffic_Analyti" data-source-line="13" id="ent0005"><rect fill="#E8F4FD" height="36.2969" rx="2.5" ry="2.5" style="stroke:#2563EB;stroke-width:0.5;" width="208.1387" x="51.8148" y="270.8869"/><text fill="#1E3A5F" font-family="sans-serif" font-size="14" lengthAdjust="spacing" textLength="188.1387" x="61.8148" y="293.882">Encrypted Traffic Analytics</text></g><!--entity Security_Automation_with_--><g class="entity" data-qualified-name="Lab Modules.Security_Automation_with_" data-source-line="14" id="ent0006"><rect fill="#E8F4FD" height="36.2969" rx="2.5" ry="2.5" style="stroke:#2563EB;stroke-width:0.5;" width="215.7881" x="47.9948" y="367.1869"/><text fill="#1E3A5F" font-family="sans-serif" font-size="14" lengthAdjust="spacing" textLength="195.7881" x="57.9948" y="390.182">Security Automation with AI</text></g><!--entity AI_for_Firewall_Policy_Op--><g class="entity" data-qualified-name="Lab Modules.AI_for_Firewall_Policy_Op" data-source-line="15" id="ent0007"><rect fill="#E8F4FD" height="36.2969" rx="2.5" ry="2.5" style="stroke:#2563EB;stroke-width:0.5;" width="219.8076" x="45.9848" y="463.4869"/><text fill="#1E3A5F" font-family="sans-serif" font-size="14" lengthAdjust="spacing" textLength="199.8076" x="55.9848" y="486.482">AI for Firewall Policy Optimiz</text></g><!--entity Future_of_AI_in_Network_S--><g class="entity" data-qualified-name="Lab Modules.Future_of_AI_in_Network_S" data-source-line="16" id="ent0008"><rect fill="#E8F4FD" height="36.2969" rx="2.5" ry="2.5" style="stroke:#2563EB;stroke-width:0.5;" width="230.041" x="40.8648" y="559.7769"/><text fill="#1E3A5F" font-family="sans-serif" font-size="14" lengthAdjust="spacing" textLength="210.041" x="50.8648" y="582.772">Future of AI in Network Securi</text></g><!--link AI_in_Network_Security_La to MLBased_Threat_Detection--><g class="link" data-entity-1="ent0003" data-entity-2="ent0004" data-link-type="dependency" data-source-line="19" id="lnk9"><path d="M155.8848,114.7369 C155.8848,131.6469 155.8848,151.2569 155.8848,168.2369" fill="none" id="AI_in_Network_Security_La-to-MLBased_Threat_Detection" style="stroke:#181818;stroke-width:1;"/><polygon fill="#181818" points="155.8848,174.2369,159.8848,165.2369,155.8848,169.2369,151.8848,165.2369,155.8848,174.2369" style="stroke:#181818;stroke-width:1;"/></g><!--link MLBased_Threat_Detection to Encrypted_Traffic_Analyti--><g class="link" data-entity-1="ent0004" data-entity-2="ent0005" data-link-type="dependency" data-source-line="20" id="lnk10"><path d="M155.8848,211.0369 C155.8848,227.9469 155.8848,247.5569 155.8848,264.5369" fill="none" id="MLBased_Threat_Detection-to-Encrypted_Traffic_Analyti" style="stroke:#181818;stroke-width:1;"/><polygon fill="#181818" points="155.8848,270.5369,159.8848,261.5369,155.8848,265.5369,151.8848,261.5369,155.8848,270.5369" style="stroke:#181818;stroke-width:1;"/></g><!--link Encrypted_Traffic_Analyti to Security_Automation_with_--><g class="link" data-entity-1="ent0005" data-entity-2="ent0006" data-link-type="dependency" data-source-line="21" id="lnk11"><path d="M155.8848,307.3369 C155.8848,324.2369 155.8848,343.8469 155.8848,360.8269" fill="none" id="Encrypted_Traffic_Analyti-to-Security_Automation_with_" style="stroke:#181818;stroke-width:1;"/><polygon fill="#181818" points="155.8848,366.8269,159.8848,357.8269,155.8848,361.8269,151.8848,357.8269,155.8848,366.8269" style="stroke:#181818;stroke-width:1;"/></g><!--link Security_Automation_with_ to AI_for_Firewall_Policy_Op--><g class="link" data-entity-1="ent0006" data-entity-2="ent0007" data-link-type="dependency" data-source-line="22" id="lnk12"><path d="M155.8848,403.6269 C155.8848,420.5369 155.8848,440.1469 155.8848,457.1269" fill="none" id="Security_Automation_with_-to-AI_for_Firewall_Policy_Op" style="stroke:#181818;stroke-width:1;"/><polygon fill="#181818" points="155.8848,463.1269,159.8848,454.1269,155.8848,458.1269,151.8848,454.1269,155.8848,463.1269" style="stroke:#181818;stroke-width:1;"/></g><!--link AI_for_Firewall_Policy_Op to Future_of_AI_in_Network_S--><g class="link" data-entity-1="ent0007" data-entity-2="ent0008" data-link-type="dependency" data-source-line="23" id="lnk13"><path d="M155.8848,499.9269 C155.8848,516.8369 155.8848,536.4469 155.8848,553.4269" fill="none" id="AI_for_Firewall_Policy_Op-to-Future_of_AI_in_Network_S" style="stroke:#181818;stroke-width:1;"/><polygon fill="#181818" points="155.8848,559.4269,159.8848,550.4269,155.8848,554.4269,151.8848,550.4269,155.8848,559.4269" style="stroke:#181818;stroke-width:1;"/></g><?plantuml-src VP7HIiCm58Rl-nI7ULrGvuPu8NIkXK7dX7ad4h8qtSBIfAIdZYg-kqdMTJ3Nqhjy_tToyhVQ2rLIGmlOKBRV6bshx4LBRU0cYTmNL5s2wQBKYYjSOoCv6CwGggtaroBm4m3CBaV6Zyb3CdT4cuoRzlH-CXt7CtkQQ8NjsLqyZYP9y1kWG7jNIZSmlNs2Q17EZVZY2buv7hJPmvgpsWXiWg2qjz4jXv4BBtLMIrwD_1uVqGB4VyLELLd5w2VGoaucGf4sGauHabBdBzDmHYkUmVlES8emvsWVBxJowZBra1mXwQ0pOyLCKw9J3SrpmI1IL3OeMENTZfEMavOxkLiqgb4NrCs4Wy2TNTRBtPPdJXmdxPjpssGY33zGAU5DIy4QM9Ke2l5zUhEDa5E472DaLJe_gR4s77GErzhp_Z52T4ukshF_pOxehHJ2y7cejJxalQ76UfatX-hgPTuSAggNUREteZy0?></g></svg>" alt="Network Topology Diagram" style="max-width:100%;height:auto;background:#fff;padding:16px;border:1px solid #e5e7eb;border-radius:8px;" />
</div>

cisco
R1# configure terminal
R1(config)# ip flow-export destination 192.168.1.100 2055
R1(config)# ip flow-export version 9
R1(config)# ip flow-cache timeout active 60
R1(config)# interface GigabitEthernet0/1
R1(config-if)# ip flow ingress
R1(config-if)# exit
R1(config)# exit

What just happened: R1 will export NetFlow v9 records to 192.168.1.100:2055. Enabling ip flow ingress on the access interface causes the router to generate flow records for incoming traffic. The active timeout controls how often flow records for active flows are exported.

Real-world note: NetFlow traffic is UDP-based; in high-throughput environments consider IPFIX or sampled flow to reduce collector load.

Verify:

R1# show ip flow export
Export source interface: GigabitEthernet0/0
Version: 9, Transport: UDP
Destination: 192.168.1.100, Port: 2055
Export packets queued for processing 0
Template data timeout (seconds): 300
R1# show ip cache flow
IP packet size distribution (bytes):
  0 - 64       10
  65 - 127     20
  128 - 255    5
  ...
Total packets accounted: 35

(Above show ip cache flow confirms flow cache activity; counts will vary in your lab.)


Step 5: Configure SNMP (v2c) for monitoring and traps

What we are doing: Allow the SIEM to poll device metrics (CPU, interface counters) and receive traps. These metrics feed ML models for resource and behavior baselining.

R1# configure terminal
R1(config)# snmp-server community NHPREP RO
R1(config)# snmp-server host 192.168.1.100 version 2c NHPREP
R1(config)# exit

SW1# configure terminal
SW1(config)# snmp-server community NHPREP RO
SW1(config)# snmp-server host 192.168.1.100 version 2c NHPREP
SW1(config)# exit

What just happened: SNMP community NHPREP (read-only) is configured and the SIEM is registered as a manager. The SIEM can poll OIDs for counters and receive traps (if configured). This periodic data helps ML establish normal performance baselines.

Real-world note: For production, use SNMPv3 with authentication and privacy to avoid credential exposure.

Verify:

R1# show snmp community
Community name: NHPREP
  Community name: NHPREP  access: ro  users: 0  groups: 0

R1# show snmp host
Host: 192.168.1.100  version: v2c
  community: NHPREP

Verification Checklist

  • Check 1: Syslog sends messages to the SIEM — verify with show logging on each device and confirm SIEM receives events (SIEM UI).
    How to verify: show logging should list Syslog logging host: 192.168.1.100.

  • Check 2: NetFlow export is active — verify show ip flow export shows destination 192.168.1.100 and templates being exported.
    How to verify: show ip flow export (see earlier expected output).

  • Check 3: NTP is synchronized and timestamps are correct — verify show ntp status and check log timestamps.
    How to verify: show ntp status; logs should show accurate timestamps with milliseconds.

  • Check 4: SNMP polling works — use the SIEM or an SNMP walk from the SIEM to confirm OIDs are readable (e.g., interface counters).
    How to verify: show snmp host on the device and SNMP walk from 192.168.1.100.


Common Mistakes

SymptomCauseFix
SIEM shows no syslog messageslogging host not configured or UDP/514 blocked by firewallConfigure logging host 192.168.1.100 and check ACLs/firewall rules allowing UDP/514
Flow records not arrivingNetFlow export destination/port mismatch or NetFlow not enabled on interfacesCheck show ip flow export; ensure ip flow export destination uses the same port as collector and ip flow ingress applied to relevant interfaces
Timestamps do not align across devicesNTP not configured or unreachableConfigure ntp server 192.168.1.100 on all devices and ensure NTP traffic allowed
SNMP inaccessibleWrong community string or SNMP host not configuredVerify snmp-server community NHPREP RO and snmp-server host 192.168.1.100 version 2c NHPREP; consider SNMPv3 for production

Key Takeaways

  • Telemetry (syslog, NetFlow/IPFIX, SNMP) is the lifeblood of AI-driven network security; accuracy and consistency (e.g., timestamps, hostnames) directly impact ML model quality.
  • Syslog provides event context; NetFlow provides behavioral context; SNMP provides health/telemetry context — combining all three enables richer detection and prioritization.
  • In production, protect telemetry in transit (TLS/VPN) and tune sampling/retention to balance detection capability with storage/cost.
  • AI-based systems prioritize and recommend actions, but reliable automation requires predictable, auditable device configuration and secure integrations.

Tip: Think of telemetry as sensor data for your AI “brain” — inaccurate sensors (bad timestamps, missing flows) will train poor models. Invest time in consistent naming, clock sync, and secure transport before building AI detection logic.


This lesson established the foundational telemetry and device configuration needed to feed an AI-driven SIEM/XDR. In subsequent lessons we will cover SIEM ingestion, enrichment pipelines, ML-assisted alerting, and automated response playbooks using the same topology.