PORT SECURITY

DYNAMIC SECURE


The mac addresses in this configuration aren't saved when the switch reboots


PROCEDURE

  1. Administratively shut down all switch ports that aren't in use

  2. Verify that all unused switch ports have been administratively shutdown

  3. Enable a dynamic secure port security only on the pertinent/used switch ports

  4. Display the default settings for port security on the specified interface

  5. Display all interfaces that have port security enabled including their mac addresses

  6. Configure the interface to only have access to 2 dynamically learned mac addresses

  7. Display the default settings for port security on the specified interface

  8. Display all interfaces that have port security enabled, including their mac addresses

  9. Assign an IP address to the PC

  10. Send out one echo request to the default-gateway * although there is no router/default gateway assigned, the switch will still capture the mac address of the PC

  11. Display all interfaces that have port security enabled including their mac addresses

IMPLEMENTATION

STATIC

PROCEDURE

  1. Administratively shut down all switch ports that aren't in use

  2. Verify that all unused switch ports have been administratively shutdown

  3. Enable port security only on the pertinent/used switch ports

  4. Assign an IP address to the PC

  5. Send out one echo request to the default-gateway * although there is no router/default gateway assigned, the switch will still capture the mac address of the PC

  6. Display the default settings for port security on the specified interface

  7. Display all interfaces that have port security enabled, including their mac addresses

  8. Configure the interface to only access a statically learned mac addresses of AAAA.BBBB.CCCC

  9. Display the default settings for port security on the specified interface

  10. Display all interfaces that have port security enabled, including their mac addresses

  11. Reconfigure the interface to have 3 mac addresses allowed

  12. Reconfigure the interface to have the following mac addresses AAAA.BBBB.CCCC, CCCC.DDDD.EEEE and 1234.ABCD.5678

  13. Display the default settings for port security on the specified interface

  14. Display all interfaces that have port security enabled, including mac addresses

IMPLEMENTATION

DYNAMIC STICKY


The mac addresses that are dynamically learned in this configuration are saved as long as there is a saved startup-config file


PROCEDURE

  1. Administratively shut down all switch ports that aren't in use

  2. Verify that all unused switch ports have been administratively shutdown

  3. Enable port security only on the pertinent/used switch ports

  4. Display the default settings for port security on the specified interface

  5. Display all interfaces that have port security enabled including their MAC address

  6. Configure the interface to dynamically learn mac addresses in sticky mode with a maximum of 3 addresses

  7. Display the default settings for port security on the specified interface

  8. Display all interfaces that have port security enabled including their MAC address

IMPLEMENTATION

FIXING VIOLATION ISSUES


Procedure for fixing an interface that is in "err-disabled" state


PROCEDURE

  1. Administratively shutdown all switch ports that aren't in use

  2. Verify that all unused switch ports have been administratively shutdown

  3. Enable port security only on the pertinent/used switch ports

  4. Display the default settings for port security on the specified interface

  5. Display all interfaces that have port security enabled including their MAC address

  6. Configure the interface to have a statically learned mac address of host A with a maximum mac address of 1 allowed

  7. Configure a security violation of shutdown on the specified interface

  8. Assign an IPv4 address to Host A & send one packet to the default gateway

  9. Display the default settings for port security on the specified interface

  10. Display all interfaces that have port security enabled including their MAC address

  11. Introduce a new host "Host B" to interface gi0/0 "which has a different" mac address - Configure Host B with an IPv4 address - send one packet to the default gateway using Host B, to trigger port-security

  12. Display the default settings for port security on the specified interface

  13. Display all interfaces that have port security enabled including their MAC address

  14. Display port security violation issues

  15. Remove the intruding host "Host B" from the network

  16. Fix the violation and re-enable the port for Host A

  17. Display the default settings for port security on the specified interface - also display all interfaces that have port security enabled including their MAC address - display any port security violation issues

IMPLEMENTATION

Last updated