Enabling Port Security

Slides:



Advertisements
Similar presentations
Mitigating Layer 2 Attacks
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Common Layer 2 Attacks and Countermeasures.
Static Routing Exercise AFNOG 2003/ Track 2 # 1 Static Routing Exercise u Unix network interface configuration u Cisco network interface configuration.
Virtual LANs.
Switching & Operations. Address learning Forward/filter decision Loop avoidance Three Switch Functions.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
Ch. 6 – Switch Configuration CCNA 3 version Overview Identify the major components of a Catalyst switch Monitor switch activity and status using.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 6 Switch Configuration.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Ch. 7 – Switch Configuration
© 2002, Cisco Systems, Inc. All rights reserved..
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
VLAN Trunking Protocol (VTP) W.lilakiatsakun. VLAN Management Challenge (1) It is not difficult to add new VLAN for a small network.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Introducing Basic Layer 2 Switching and Bridging Functions.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching.
Virtual LAN Design Switches also have enabled the creation of Virtual LANs (VLANs). VLANs provide greater opportunities to manage the flow of traffic on.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
Module 6 – Switch Configuration CCNA 3 Cabrillo College.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration Cisco Networking Academy.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
1 CCNA 3 v3.1 Module 6 Switch Configuration Claes Larsen, CCAI.
Sybex CCNA Chapter 11: VLAN’s Instructor & Todd Lammle.
Building Cisco Multilayer Switched Networks (BCMSN)
Ch. 6 – Switch Configuration
Network Security1 – Chapter 5 – Secure LAN Switching Layer 2 security –Port security –IP permit lists –Protocol filtering –Controlling LAN floods (using.
VLAN V irtual L ocal A rea N etwork VLAN Network performance is a key factor in the productivity of an organization. One of the technologies used to.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 1 – Chapter 9 Ethernet Switch Configuration 1.
Discovery 2 Internetworking Module 5 JEOPARDY John Celum.
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 8 Virtual LANs.
SW REVERSE JEOPARDY Chapter 1 CCNA2 SW Start-up Routing table Routing table Router parts Router parts Choosing a path Choosing a path Addressing Pot.
Intro to Switching Lecture # 3 Hassan Shuja 03/14/2006.
Switching Basics and Intermediate Routing CCNA 3 Chapter 8.
Static Routing Exercise
NetPro-ITI Ethernet LANs
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching 3.0.
Managing Networks and Network Devices
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Basic Switch Configurations.
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
W&L Page 1 CCNA CCNA Training 2.7 Configure and verify trunking on Cisco switches Jose Luis Flores / Amel Walkinshaw Aug, 2015.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
W&L Page 1 CCNA CCNA Training 2.5 Describe how VLANs create logically separate networks and the need for routing between them Jose Luis.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—2-1 Ethernet LANs Understanding Switch Security.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
Cisco Networking Academy Semester 3 Basic 1900 Switch Configuration.
Exploration 3 Chapter 4. What is VTP? VTP allows a network manager to configure a switch so that it will propagate VLAN configurations to other switches.
Instructor & Todd Lammle
© 2002, Cisco Systems, Inc. All rights reserved.
Understanding Switch Security
Instructor Materials Chapter 5: Ethernet
– Chapter 5 – Secure LAN Switching
Chapter 5: Switch Configuration
Chapter 2: Basic Switching Concepts and Configuration
Instructor: Mr Malik Zaib
Virtual LANs.
Understanding Switch Security
Chapter 5: Switch Configuration
Net 412 (Practical Part) LAB 5-port security
Routing and Switching Essentials v6.0
© 2002, Cisco Systems, Inc. All rights reserved.
Chapter 3: Implementing VLAN Security
© 2002, Cisco Systems, Inc. All rights reserved.
Chapter 2: Scaling VLANs
LAN Switching and Wireless – Chapter 2
Presentation transcript:

Enabling Port Security CISCO PRESENTATION Enabling Port Security

2950 CISCO SWITCH

2950 CISCO SWITCH The Cisco Catalyst® 2950 Series is a family of wire-speed Fast Ethernet desktop switches that delivers the next generation of performance and functionality for the LAN with 10/100/1000BaseT uplinks, enhanced IOS service, quality of service (QoS), multicast management, high availability and security features using a simple, Web-based interface.

Introduction Secured ports restrict a port to a user-defined group of stations. When you assign secure addresses to a secure port, the switch does not forward any packets with source addresses outside the defined group of addresses. If you define the address table of a secure port to contain only one address, the workstation or server attached to that port is guaranteed the full bandwidth of the port. As part of securing the port, you can also define the size of the address table for the port.

IMPORTANT NOTE Port security can only be configured on static access ports.

Secured ports generate address-security violations under these conditions ·  The address table of a secured port is full, and the address of an incoming packet is not found in the table. · An incoming packet has a source address assigned as a secure address on another port

ADVANTAGES OF PORT SECURITY ·      Dedicated bandwidth If the size of the address table is set to 1, the attached device is guaranteed the full bandwidth of the port. · Added security—Unknown devices cannot connect to the port

COMMANDS TO VALIDATE PORT SECURITY Interface :Port to secure. Security :Enable port security on the port. Trap :Issue a trap when an address-security violation occurs. Shutdown Port :Disable the port when an address-security violation occurs.

COMMANDS TO VALIDATE PORT SECURITY Secure Addresses :Number of addresses in the secure address table for this port. Secure ports have at least one address. Max Addresses :Number of addresses that the secure address table for the port can contain. Security Rejects :Number of unauthorized addresses seen on the port.

Security Violation Mode Shutdown- The interface is shut down immediately following a security violation Restrict- A security violation sends a trap to the network management station. Protect- When the port secure addresses reach the allowed limit on the port, all packets with unknown addresses are dropped. **The default is shutdown

Defining the Maximum Secure Address Count A secure port can have from 1 to 132 associated secure addresses. Setting one address in the MAC address table for the port ensures that the attached device has the full bandwidth of the port. If the secure-port maximum addresses are set between 1 to 132 addresses and some of the secure addresses have not been added by user, the remaining addresses are dynamically learnt and become secure addresses.

IMPORTANT NOTE If the port link goes down, all the dynamically learned addresses are removed

Enabling Port Security on The Switch Beginning in privileged EXEC mode on the switch, follow these steps to enable port security, these settings will guarantee accurate and tight security.

TABLE OF COMMANDS

TABLE OF COMMANDS

DISABLING PORT SECURITY

AVOID CONFIGURATION CONFLICTS

TABLE OF CONFLICTING FEATURES