These guides provide technical guidance intended to help network administrators and security officers improve the security of their networks. They contain the principles and guidance for secure configuration of switches, with detailed instructions. The information presented can be used to control access, help resist attacks, shield other network components, and help protect the integrity and confidentiality of network traffic.