Port Security is an extremely simple yet powerful security tool present on Cisco switches. All about Port Security What is Port Security? After that, we will start to put our hands on the gears. However, in the next section, we are going to explain all the details and theory you need. Do not hardcode it manually.įrom these requirements, you should be able to guess what port security is about. Remember what device is connected to FastEthernet 0/1 through 0/3 and allow only that.If multiple devices connect either to FastEthernet 0/3 or 0/4, shut down the port and generate an alert.In case multiple devices connect to FastEthernet 0/2, allow the first only and generate an alert.In case multiple devices connect to FastEthernet 0/1, allow the first only.Configure Switch to allow a single device on each port.The only device we are going to configure is Switch, as follows. Specifically, we are going to try four different configurations on four different ports. IP Address Configuration The Requirementsįor this lab, we are going to implement Port Security in several flavors. The following table reports the details about the IP address configuration. This is not needed since we are going to use only intra-VLAN communication. Obviously, this is something we don’t want, and we are going to block that with port-security.Īll PCs have a correct IP address in the VLAN 1 subnet ( 10.192.168.1.0/24), but no default gateway. This is the “RogueSwitch”, that might be a switch a user connected in order to have more ports on his desk. However, for the purpose of this lab, one switch is out of our control. For this lab, we have to two switches but we manage only one of them.Īs you can see from the topology above, we are working with two switches and five computers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |