Things You Need to Know About Switch Security
Modularizing Internal Security
- Use switch port security at the building access layer
- Use access lists at the building distribution layer
- Do not implement packet manipulation at the campus core layer
- Use host and network based IPS, private VLANs, ACLs, and secure passwords in the Server Farm
- MAC address flooding
- VLAN hopping
- Spoofing DHCP, ARP and MAC addressing
- Cisco Discovery Protocol (CDP)
- Management protocols
- Limits MAC flooding attacks and locks down the port
- Sets an SNMP trap
- Allowed frames are forwarded
- New MAC addresses over limit are not allowed
- Switch responds to non-allowed framed
- Switch(config)# interface fa0/2
- Switch(config-if)# switchport mode access
- Switch(config-if)# switchport access VLAN 2
- Switch(config-if)# switchport port-security
- Switch(config-if)# switchport port-security maximum 2
- Switch(config-if)# switchport port-security mac-address 0000.1111.222
- Switch(config-if)# switchport port-security mac-address sticky
- Switch(config-if)# switchport port-security violate shut down
- Switch(config-if)# switchport port-security aging time 60
- Switch(config-if)# switchport port-security aging type inactivity
- CCNP Exam Prep Tips and Must Knows
- CCNP Exam Prep Tips and Must Knows
- CCNP Exam Prep Tips and Must Knows
- CCNP Exam Prep Tips and Must Knows
- CCNP Exam Prep Tips and Must Knows
- CCNP Exam Prep Tips and Must Knows
- CCNP Exam Prep Tips and Must Knows
- CCNP Exam Prep Tips and Must Knows
- CCNP Exam Prep Tips and Must Knows
- CCNP Exam Prep Tips and Must Knows about Switch Security
- CCNP Exam Prep Tips and Must Knows
Switch Attack Categories
MAC address-based attacks
VLAN attacks
Spoofing attacks
Attacks on switch devices
Port Security
Port Security Configuration
CCNP Exam Prep Tips and Must Knows Series
Please support our Sponsors here :