SlideShare una empresa de Scribd logo
1 de 18
CISCO CCNA PORT SECURITY
TO WATCH OUR CISCO CCNA VIDEO TRAININGS PLEASE CHECK OUT THE LINK BELOW:
WWW.ASMED.COM/C1
ASM EDUCATIONAL CENTER INC. (ASM)
WHERE TRAINING, TECHNOLOGY & SERVICE CONVERGE
PHONE: (301) 984-7400
ROCKVILLE,MD
CISCO CCNA PORT SECURITY
CISCO CCNA PORT SECURITY
HERE WHAT I HAVE:
PC1=10.10.10.1
PC2=10.10.10.2
PC3=10.10.10.3 CONNECTED TO PORT F0/3 WHICH IS LOCATED IN LOBBY
HACKER=10.10.10.4
THE GOAL IS I WANT TO PROTECT THE PORT F0/3 LOCATED IN LOBBY AND
MAKE SURE ONLY PC3=SALES3 BE ABLE TO CONNECT AND DO HIS WORK.
HINT: YOU WILL GO INT F0/3 AND START WITH SWITCHPORT?
CISCO CCNA PORT SECURITY
STEP 1) MAKE SURE YOU ENABLE PORT-SECURITY
SW1(CONFIG)#
SW1(CONFIG)#INT F0/3
SW1(CONFIG-IF)#SWITCHPORT ?
ACCESS SET ACCESS MODE CHARACTERISTICS OF THE INTERFACE
MODE SET TRUNKING MODE OF THE INTERFACE
NATIVE SET TRUNKING NATIVE CHARACTERISTICS WHEN INTERFACE IS IN
TRUNKING MODE
NONEGOTIATE DEVICE WILL NOT ENGAGE IN NEGOTIATION PROTOCOL ON THIS
INTERFACE
PORT-SECURITY SECURITY RELATED COMMAND
PRIORITY SET APPLIANCE 802.1P PRIORITY
CISCO CCNA PORT SECURITY
TRUNK SET TRUNKING CHARACTERISTICS OF THE INTERFACE
VOICE VOICE APPLIANCE ATTRIBUTES
SW1(CONFIG-IF)#SWITCHPORT PORT
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY ?
MAC-ADDRESS SECURE MAC ADDRESS
MAXIMUM MAX SECURE ADDRESSES
VIOLATION SECURITY VIOLATION MODE
<CR>
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY
COMMAND REJECTED: FASTETHERNET0/3 IS A DYNAMIC PORT.
SW1(CONFIG-IF)#SW
CISCO CCNA PORT SECURITY
SW1(CONFIG-IF)#SWITCHPORT MO
SW1(CONFIG-IF)#SWITCHPORT MODE ACC
SW1(CONFIG-IF)#SWITCHPORT MODE ?
ACCESS SET TRUNKING MODE TO ACCESS UNCONDITIONALLY
DYNAMIC SET TRUNKING MODE TO DYNAMICALLY NEGOTIATE ACCESS OR TRUNK MODE
TRUNK SET TRUNKING MODE TO TRUNK UNCONDITIONALLY
SW1(CONFIG-IF)#SWITCHPORT MODE DY
SW1(CONFIG-IF)#SWITCHPORT MODE DYNAMIC ?
AUTO SET TRUNKING MODE DYNAMIC NEGOTIATION PARAMETER TO AUTO
DESIRABLE SET TRUNKING MODE DYNAMIC NEGOTIATION PARAMETER TO DESIRABLE
SW1(CONFIG-IF)#SWITCHPORT MODE ACC
SW1(CONFIG-IF)#SWITCHPORT MODE ACCESS
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY
CISCO CCNA PORT SECURITY
HINT: MAKE SURE WHEN YOU DO ABOVE; YOU HAVE MADE THE PORT MODE ACCESS;
STEP 2) DEFINE HOW MANY MAC-ADDRESS CAN BE CONNECTED THE
DEFAULT=1 (IF I WRITE SHOW RUN ) IT WILL NOT BE SEEN FOR DEFAULT VALUE
SW1#CONFIG T
ENTER CONFIGURATION COMMANDS, ONE PER LINE. END WITH CNTL/Z.
SW1(CONFIG)#INT F0/3
SW1(CONFIG-IF)#SW
SW1(CONFIG-IF)#SWITCHPORT PO
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY ?
MAC-ADDRESS SECURE MAC ADDRESS
MAXIMUM MAX SECURE ADDRESSES
VIOLATION SECURITY VIOLATION MODE
<CR>
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY MAX
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY MAXIMUM ?
<1-132> MAXIMUM ADDRESSES
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY MAXIMUM 2
CISCO CCNA PORT SECURITY
STEP 3) TELL WHAT IS THE MAC OF THE PC CONNECTED;
HINT: I CAN DO IN TWO WAY:
• STATICALLY
• DYNAMICALLY USING THE KEY WORD STICKY
CISCO CCNA PORT SECURITY
SW1(CONFIG-IF)#SW
SW1(CONFIG-IF)#SWITCHPORT PO
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY ?
MAC-ADDRESS SECURE MAC ADDRESS
MAXIMUM MAX SECURE ADDRESSES
VIOLATION SECURITY VIOLATION MODE
<CR>
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY MAC
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY MAC-ADDRESS ?
H.H.H 48 BIT MAC ADDRESS
STICKY CONFIGURE DYNAMIC SECURE ADDRESSES AS STICKY
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY MAC-ADDRESS ST
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY MAC-ADDRESS STICKY ?
H.H.H 48 BIT MAC ADDRESS
<CR>
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY MAC-ADDRESS STICKY
SW1(CONFIG-IF)#
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY MAC-ADDRESS ?
H.H.H 48 BIT MAC ADDRESS
STICKY CONFIGURE DYNAMIC SECURE ADDRESSES AS STICKY
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY MAC-ADDRESS 2222.2222.2222
CISCO CCNA PORT SECURITY
STEP 4) TELL SWITCH WHAT KIND OF ACTION TO TAKE
SW1(CONFIG-IF)#
SW1(CONFIG-IF)#SW
SW1(CONFIG-IF)#SWITCHPORT PO
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY ?
MAC-ADDRESS SECURE MAC ADDRESS
MAXIMUM MAX SECURE ADDRESSES
VIOLATION SECURITY VIOLATION MODE
<CR>
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY VIOL
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY VIOLATION ?
PROTECT SECURITY VIOLATION PROTECT MODE
RESTRICT SECURITY VIOLATION RESTRICT MODE
SHUTDOWN SECURITY VIOLATION SHUTDOWN MODE
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY VIOLATION SHUR
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY VIOLATION SHUT
SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY VIOLATION SHUTDOWN
CISCO CCNA PORT SECURITY
HINT: THE DEFAULT IS SHUTDOWN AS WE SEE IN THE SHOW RUN IT WILL NOT
SHOW UP.
INTERFACE FASTETHERNET0/3
SWITCHPORT MODE ACCESS
SWITCHPORT PORT-SECURITY
SWITCHPORT PORT-SECURITY MAXIMUM 2
SWITCHPORT PORT-SECURITY MAC-ADDRESS STICKY
SWITCHPORT PORT-SECURITY MAC-ADDRESS 2222.2222.2222
!
CISCO CCNA PORT SECURITY
AS WE SEE THE DEFAULT SHUTDOWN IS NOT ABOVE:
I GO AND I PING PC3
PC>PING 10.10.10.3
PINGING 10.10.10.3 WITH 32 BYTES OF DATA:
REPLY FROM 10.10.10.3: BYTES=32 TIME=109MS TTL=128
REPLY FROM 10.10.10.3: BYTES=32 TIME=62MS TTL=128
REPLY FROM 10.10.10.3: BYTES=32 TIME=63MS TTL=128
REPLY FROM 10.10.10.3: BYTES=32 TIME=62MS TTL=128
PING STATISTICS FOR 10.10.10.3:
PACKETS: SENT = 4, RECEIVED = 4, LOST = 0 (0% LOSS),
APPROXIMATE ROUND TRIP TIMES IN MILLI-SECONDS:
MINIMUM = 62MS, MAXIMUM = 109MS, AVERAGE = 74MS
PC>
CISCO CCNA PORT SECURITY
NOW LET’S LOOK AT SHOW RUN:
INTERFACE FASTETHERNET0/3
SWITCHPORT MODE ACCESS
SWITCHPORT PORT-SECURITY
SWITCHPORT PORT-SECURITY MAXIMUM 2
SWITCHPORT PORT-SECURITY MAC-ADDRESS STICKY
SWITCHPORT PORT-SECURITY MAC-ADDRESS 2222.2222.2222
SWITCHPORT PORT-SECURITY MAC-ADDRESS STICKY 00D0.D320.E74C
CISCO CCNA PORT SECURITY
HERE IS BEFORE ANY VIOLATIONS:
SW1#SHOW PORT
SW1#SHOW PORT-SECURITY INT F0/3
PORT SECURITY : ENABLED
PORT STATUS : SECURE-UP
VIOLATION MODE : SHUTDOWN
AGING TIME : 0 MINS
AGING TYPE : ABSOLUTE
SECURESTATIC ADDRESS AGING : DISABLED
MAXIMUM MAC ADDRESSES : 2
TOTAL MAC ADDRESSES : 2
CONFIGURED MAC ADDRESSES : 1
STICKY MAC ADDRESSES : 1
LAST SOURCE ADDRESS:VLAN : 00D0.D320.E74C:1
SECURITY VIOLATION COUNT : 0
CISCO CCNA PORT SECURITY
NOW I WILL REMOVE THE CABLE FROM PC3 AND HACKER WILL COME AND CONNECT TO THE PORT
F0/3
SW1#SHOW PORT-SECURITY INT F0/3
PORT SECURITY : ENABLED
PORT STATUS : SECURE-SHUTDOWN
VIOLATION MODE : SHUTDOWN
AGING TIME : 0 MINS
AGING TYPE : ABSOLUTE
SECURESTATIC ADDRESS AGING : DISABLED
MAXIMUM MAC ADDRESSES : 2
TOTAL MAC ADDRESSES : 2
CONFIGURED MAC ADDRESSES : 1
STICKY MAC ADDRESSES : 1
LAST SOURCE ADDRESS:VLAN : 00E0.A38B.4828:1
SECURITY VIOLATION COUNT : 1
CISCO CCNA PORT SECURITY
AS WE SEE I HAVE PORT IN SECURE SHUTDOWN MODE
HERE IS ANOTHER SHOW COMMANDS:
SW1#SHOW INT F0/3
FASTETHERNET0/3 IS DOWN, LINE PROTOCOL IS DOWN (ERR-DISABLED)
CISCO CCNA PORT SECURITY
LET’S LOOK AT PORT 1 THAT I DID NOT CONFIGURE PORT SECURITY
SW1#
SW1#SHOW PORT-SECURITY INT F0/1
PORT SECURITY : DISABLED
PORT STATUS : SECURE-DOWN
VIOLATION MODE : SHUTDOWN
AGING TIME : 0 MINS
AGING TYPE : ABSOLUTE
SECURESTATIC ADDRESS AGING : DISABLED
MAXIMUM MAC ADDRESSES : 1
TOTAL MAC ADDRESSES : 0
CONFIGURED MAC ADDRESSES : 0
STICKY MAC ADDRESSES : 0
LAST SOURCE ADDRESS:VLAN : 0000.0000.0000:0
SECURITY VIOLATION COUNT : 0
AS WE SEE IN THIS CASE I DID NOT ENABLE IT PORT SECURITY; SO I SEE THE FIRST LINE SAYS DISABLED
HOW DO YOU FIXED IT?
YOU AS ADMINISTRATOR MUST GO TO THAT PORT; GIVE SHUT AND NO SHUT
ASM EDUCATIONAL CENTER INC. (ASM)
WHERE TRAINING, TECHNOLOGY & SERVICE CONVERGE
TO WATCH OUR CISCO CCNA VIDEO TRAININGS PLEASE CHECK OUT THE LINK
BELOW:
WWW.ASMED.COM/C1
PHONE: (301) 984-7400
ROCKVILLE,MD

Más contenido relacionado

La actualidad más candente

Packet Tracer Simulation Lab Layer3 Routing
Packet Tracer Simulation Lab Layer3 RoutingPacket Tracer Simulation Lab Layer3 Routing
Packet Tracer Simulation Lab Layer3 Routing
Johnson Liu
 
How to create and delete vlan on cisco catalyst switch
How to create and delete vlan on cisco catalyst switchHow to create and delete vlan on cisco catalyst switch
How to create and delete vlan on cisco catalyst switch
IT Tech
 

La actualidad más candente (20)

Cisco CCNA IP SLA with tracking configuration
Cisco CCNA IP SLA  with tracking  configurationCisco CCNA IP SLA  with tracking  configuration
Cisco CCNA IP SLA with tracking configuration
 
Cisco CCNA- PPP Multilink Configuration
Cisco CCNA- PPP Multilink ConfigurationCisco CCNA- PPP Multilink Configuration
Cisco CCNA- PPP Multilink Configuration
 
Cisco CCNA OSPF IPV6 Configuration
Cisco CCNA OSPF IPV6 ConfigurationCisco CCNA OSPF IPV6 Configuration
Cisco CCNA OSPF IPV6 Configuration
 
IPSec VPN
IPSec VPNIPSec VPN
IPSec VPN
 
Cisco CCNA- NAT Configuration
Cisco CCNA- NAT ConfigurationCisco CCNA- NAT Configuration
Cisco CCNA- NAT Configuration
 
Cisco CCNA GRE Tunnel Configuration
Cisco CCNA GRE Tunnel ConfigurationCisco CCNA GRE Tunnel Configuration
Cisco CCNA GRE Tunnel Configuration
 
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
 
Cisco CCNA EIGRP IPV6 Configuration
Cisco CCNA EIGRP IPV6 ConfigurationCisco CCNA EIGRP IPV6 Configuration
Cisco CCNA EIGRP IPV6 Configuration
 
DMVPN
DMVPNDMVPN
DMVPN
 
Juniper JNCIA – Juniper OSPF Route Configuration
Juniper JNCIA – Juniper OSPF Route ConfigurationJuniper JNCIA – Juniper OSPF Route Configuration
Juniper JNCIA – Juniper OSPF Route Configuration
 
Juniper JNCIA – Juniper RIP and OSPF Route Configuration
Juniper JNCIA – Juniper RIP and OSPF Route ConfigurationJuniper JNCIA – Juniper RIP and OSPF Route Configuration
Juniper JNCIA – Juniper RIP and OSPF Route Configuration
 
GRE Tunnel Configuration
GRE Tunnel ConfigurationGRE Tunnel Configuration
GRE Tunnel Configuration
 
CCNA - Routing & Switching Commands
CCNA - Routing & Switching CommandsCCNA - Routing & Switching Commands
CCNA - Routing & Switching Commands
 
Packet Tracer Simulation Lab Layer3 Routing
Packet Tracer Simulation Lab Layer3 RoutingPacket Tracer Simulation Lab Layer3 Routing
Packet Tracer Simulation Lab Layer3 Routing
 
Ccna Commands In 10 Minutes
Ccna Commands In 10 MinutesCcna Commands In 10 Minutes
Ccna Commands In 10 Minutes
 
Configure Cisco Routers for Syslog, NTP, and SSH Operations
Configure Cisco Routers for Syslog, NTP, and SSH Operations Configure Cisco Routers for Syslog, NTP, and SSH Operations
Configure Cisco Routers for Syslog, NTP, and SSH Operations
 
Policy Based Routing
Policy Based RoutingPolicy Based Routing
Policy Based Routing
 
Cisco commands List for Beginners (CCNA, CCNP)
Cisco commands List for Beginners (CCNA, CCNP)Cisco commands List for Beginners (CCNA, CCNP)
Cisco commands List for Beginners (CCNA, CCNP)
 
How to create and delete vlan on cisco catalyst switch
How to create and delete vlan on cisco catalyst switchHow to create and delete vlan on cisco catalyst switch
How to create and delete vlan on cisco catalyst switch
 
DMVPN configuration - Configuring Cisco dynamic Multipoint VPN - HUB, SPOKES,...
DMVPN configuration - Configuring Cisco dynamic Multipoint VPN - HUB, SPOKES,...DMVPN configuration - Configuring Cisco dynamic Multipoint VPN - HUB, SPOKES,...
DMVPN configuration - Configuring Cisco dynamic Multipoint VPN - HUB, SPOKES,...
 

Similar a Cisco CCNA Port Security

Ccna lab manual 640 802
Ccna lab manual 640 802Ccna lab manual 640 802
Ccna lab manual 640 802
manikkan
 
2.2.4.9 packet tracer configuring switch port security instructions - ig
2.2.4.9 packet tracer   configuring switch port security instructions - ig2.2.4.9 packet tracer   configuring switch port security instructions - ig
2.2.4.9 packet tracer configuring switch port security instructions - ig
Alex Ramirez
 
Expl sw chapter_02_switches_part_2
Expl sw chapter_02_switches_part_2Expl sw chapter_02_switches_part_2
Expl sw chapter_02_switches_part_2
aghacrom
 
How to configure port security in cisco switch
How to configure port security in cisco switchHow to configure port security in cisco switch
How to configure port security in cisco switch
IT Tech
 

Similar a Cisco CCNA Port Security (20)

Cap2 configuring switch
Cap2   configuring switchCap2   configuring switch
Cap2 configuring switch
 
Security Concerns in LANs.pptx
Security Concerns in LANs.pptxSecurity Concerns in LANs.pptx
Security Concerns in LANs.pptx
 
Switch security
Switch securitySwitch security
Switch security
 
Network Security- port security.pptx
Network Security- port security.pptxNetwork Security- port security.pptx
Network Security- port security.pptx
 
SRWE_Module_11.pptx
SRWE_Module_11.pptxSRWE_Module_11.pptx
SRWE_Module_11.pptx
 
Switchport port security explained with examples
Switchport port security explained with examplesSwitchport port security explained with examples
Switchport port security explained with examples
 
Ccna lab manual 640 802
Ccna lab manual 640 802Ccna lab manual 640 802
Ccna lab manual 640 802
 
Cisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch PortCisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch Port
 
How to Configure Port-Security on Cisco Switch for Enhanced Network Security ...
How to Configure Port-Security on Cisco Switch for Enhanced Network Security ...How to Configure Port-Security on Cisco Switch for Enhanced Network Security ...
How to Configure Port-Security on Cisco Switch for Enhanced Network Security ...
 
2.2.4.9 packet tracer configuring switch port security instructions - ig
2.2.4.9 packet tracer   configuring switch port security instructions - ig2.2.4.9 packet tracer   configuring switch port security instructions - ig
2.2.4.9 packet tracer configuring switch port security instructions - ig
 
Expl sw chapter_02_switches_part_2
Expl sw chapter_02_switches_part_2Expl sw chapter_02_switches_part_2
Expl sw chapter_02_switches_part_2
 
1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618) 1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618)
 
CCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part IICCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part II
 
Ch6
Ch6Ch6
Ch6
 
Understanding and Preventing Layer 2 Attacks
Understanding and Preventing Layer 2 AttacksUnderstanding and Preventing Layer 2 Attacks
Understanding and Preventing Layer 2 Attacks
 
Ejercicio 4 vtp
Ejercicio 4 vtpEjercicio 4 vtp
Ejercicio 4 vtp
 
How to configure port security in cisco switch
How to configure port security in cisco switchHow to configure port security in cisco switch
How to configure port security in cisco switch
 
Mitigating Layer2 Attacks
Mitigating Layer2 AttacksMitigating Layer2 Attacks
Mitigating Layer2 Attacks
 
SAS (Secure Active Switch)
SAS (Secure Active Switch)SAS (Secure Active Switch)
SAS (Secure Active Switch)
 
CCIE R&S Real Lab Workbbok 2018 updated
CCIE R&S Real Lab Workbbok 2018 updatedCCIE R&S Real Lab Workbbok 2018 updated
CCIE R&S Real Lab Workbbok 2018 updated
 

Más de Hamed Moghaddam

Más de Hamed Moghaddam (8)

CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1
 
Cisco CCNA- DHCP Server
Cisco CCNA-  DHCP ServerCisco CCNA-  DHCP Server
Cisco CCNA- DHCP Server
 
Microsoft MCSA- Joining Client Machines To The Domain!
Microsoft MCSA- Joining Client Machines To The Domain!Microsoft MCSA- Joining Client Machines To The Domain!
Microsoft MCSA- Joining Client Machines To The Domain!
 
Microsoft MCSA - Install active directory domain services (adds) role
Microsoft MCSA - Install active directory domain services (adds) roleMicrosoft MCSA - Install active directory domain services (adds) role
Microsoft MCSA - Install active directory domain services (adds) role
 
CISSP Certification-Asset Security
CISSP Certification-Asset SecurityCISSP Certification-Asset Security
CISSP Certification-Asset Security
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
Become CISSP Certified
Become CISSP CertifiedBecome CISSP Certified
Become CISSP Certified
 

Último

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Último (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 

Cisco CCNA Port Security

  • 1. CISCO CCNA PORT SECURITY TO WATCH OUR CISCO CCNA VIDEO TRAININGS PLEASE CHECK OUT THE LINK BELOW: WWW.ASMED.COM/C1 ASM EDUCATIONAL CENTER INC. (ASM) WHERE TRAINING, TECHNOLOGY & SERVICE CONVERGE PHONE: (301) 984-7400 ROCKVILLE,MD
  • 2. CISCO CCNA PORT SECURITY
  • 3. CISCO CCNA PORT SECURITY HERE WHAT I HAVE: PC1=10.10.10.1 PC2=10.10.10.2 PC3=10.10.10.3 CONNECTED TO PORT F0/3 WHICH IS LOCATED IN LOBBY HACKER=10.10.10.4 THE GOAL IS I WANT TO PROTECT THE PORT F0/3 LOCATED IN LOBBY AND MAKE SURE ONLY PC3=SALES3 BE ABLE TO CONNECT AND DO HIS WORK. HINT: YOU WILL GO INT F0/3 AND START WITH SWITCHPORT?
  • 4. CISCO CCNA PORT SECURITY STEP 1) MAKE SURE YOU ENABLE PORT-SECURITY SW1(CONFIG)# SW1(CONFIG)#INT F0/3 SW1(CONFIG-IF)#SWITCHPORT ? ACCESS SET ACCESS MODE CHARACTERISTICS OF THE INTERFACE MODE SET TRUNKING MODE OF THE INTERFACE NATIVE SET TRUNKING NATIVE CHARACTERISTICS WHEN INTERFACE IS IN TRUNKING MODE NONEGOTIATE DEVICE WILL NOT ENGAGE IN NEGOTIATION PROTOCOL ON THIS INTERFACE PORT-SECURITY SECURITY RELATED COMMAND PRIORITY SET APPLIANCE 802.1P PRIORITY
  • 5. CISCO CCNA PORT SECURITY TRUNK SET TRUNKING CHARACTERISTICS OF THE INTERFACE VOICE VOICE APPLIANCE ATTRIBUTES SW1(CONFIG-IF)#SWITCHPORT PORT SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY ? MAC-ADDRESS SECURE MAC ADDRESS MAXIMUM MAX SECURE ADDRESSES VIOLATION SECURITY VIOLATION MODE <CR> SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY COMMAND REJECTED: FASTETHERNET0/3 IS A DYNAMIC PORT. SW1(CONFIG-IF)#SW
  • 6. CISCO CCNA PORT SECURITY SW1(CONFIG-IF)#SWITCHPORT MO SW1(CONFIG-IF)#SWITCHPORT MODE ACC SW1(CONFIG-IF)#SWITCHPORT MODE ? ACCESS SET TRUNKING MODE TO ACCESS UNCONDITIONALLY DYNAMIC SET TRUNKING MODE TO DYNAMICALLY NEGOTIATE ACCESS OR TRUNK MODE TRUNK SET TRUNKING MODE TO TRUNK UNCONDITIONALLY SW1(CONFIG-IF)#SWITCHPORT MODE DY SW1(CONFIG-IF)#SWITCHPORT MODE DYNAMIC ? AUTO SET TRUNKING MODE DYNAMIC NEGOTIATION PARAMETER TO AUTO DESIRABLE SET TRUNKING MODE DYNAMIC NEGOTIATION PARAMETER TO DESIRABLE SW1(CONFIG-IF)#SWITCHPORT MODE ACC SW1(CONFIG-IF)#SWITCHPORT MODE ACCESS SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY
  • 7. CISCO CCNA PORT SECURITY HINT: MAKE SURE WHEN YOU DO ABOVE; YOU HAVE MADE THE PORT MODE ACCESS; STEP 2) DEFINE HOW MANY MAC-ADDRESS CAN BE CONNECTED THE DEFAULT=1 (IF I WRITE SHOW RUN ) IT WILL NOT BE SEEN FOR DEFAULT VALUE SW1#CONFIG T ENTER CONFIGURATION COMMANDS, ONE PER LINE. END WITH CNTL/Z. SW1(CONFIG)#INT F0/3 SW1(CONFIG-IF)#SW SW1(CONFIG-IF)#SWITCHPORT PO SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY ? MAC-ADDRESS SECURE MAC ADDRESS MAXIMUM MAX SECURE ADDRESSES VIOLATION SECURITY VIOLATION MODE <CR> SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY MAX SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY MAXIMUM ? <1-132> MAXIMUM ADDRESSES SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY MAXIMUM 2
  • 8. CISCO CCNA PORT SECURITY STEP 3) TELL WHAT IS THE MAC OF THE PC CONNECTED; HINT: I CAN DO IN TWO WAY: • STATICALLY • DYNAMICALLY USING THE KEY WORD STICKY
  • 9. CISCO CCNA PORT SECURITY SW1(CONFIG-IF)#SW SW1(CONFIG-IF)#SWITCHPORT PO SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY ? MAC-ADDRESS SECURE MAC ADDRESS MAXIMUM MAX SECURE ADDRESSES VIOLATION SECURITY VIOLATION MODE <CR> SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY MAC SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY MAC-ADDRESS ? H.H.H 48 BIT MAC ADDRESS STICKY CONFIGURE DYNAMIC SECURE ADDRESSES AS STICKY SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY MAC-ADDRESS ST SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY MAC-ADDRESS STICKY ? H.H.H 48 BIT MAC ADDRESS <CR> SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY MAC-ADDRESS STICKY SW1(CONFIG-IF)# SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY MAC-ADDRESS ? H.H.H 48 BIT MAC ADDRESS STICKY CONFIGURE DYNAMIC SECURE ADDRESSES AS STICKY SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY MAC-ADDRESS 2222.2222.2222
  • 10. CISCO CCNA PORT SECURITY STEP 4) TELL SWITCH WHAT KIND OF ACTION TO TAKE SW1(CONFIG-IF)# SW1(CONFIG-IF)#SW SW1(CONFIG-IF)#SWITCHPORT PO SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY ? MAC-ADDRESS SECURE MAC ADDRESS MAXIMUM MAX SECURE ADDRESSES VIOLATION SECURITY VIOLATION MODE <CR> SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY VIOL SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY VIOLATION ? PROTECT SECURITY VIOLATION PROTECT MODE RESTRICT SECURITY VIOLATION RESTRICT MODE SHUTDOWN SECURITY VIOLATION SHUTDOWN MODE SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY VIOLATION SHUR SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY VIOLATION SHUT SW1(CONFIG-IF)#SWITCHPORT PORT-SECURITY VIOLATION SHUTDOWN
  • 11. CISCO CCNA PORT SECURITY HINT: THE DEFAULT IS SHUTDOWN AS WE SEE IN THE SHOW RUN IT WILL NOT SHOW UP. INTERFACE FASTETHERNET0/3 SWITCHPORT MODE ACCESS SWITCHPORT PORT-SECURITY SWITCHPORT PORT-SECURITY MAXIMUM 2 SWITCHPORT PORT-SECURITY MAC-ADDRESS STICKY SWITCHPORT PORT-SECURITY MAC-ADDRESS 2222.2222.2222 !
  • 12. CISCO CCNA PORT SECURITY AS WE SEE THE DEFAULT SHUTDOWN IS NOT ABOVE: I GO AND I PING PC3 PC>PING 10.10.10.3 PINGING 10.10.10.3 WITH 32 BYTES OF DATA: REPLY FROM 10.10.10.3: BYTES=32 TIME=109MS TTL=128 REPLY FROM 10.10.10.3: BYTES=32 TIME=62MS TTL=128 REPLY FROM 10.10.10.3: BYTES=32 TIME=63MS TTL=128 REPLY FROM 10.10.10.3: BYTES=32 TIME=62MS TTL=128 PING STATISTICS FOR 10.10.10.3: PACKETS: SENT = 4, RECEIVED = 4, LOST = 0 (0% LOSS), APPROXIMATE ROUND TRIP TIMES IN MILLI-SECONDS: MINIMUM = 62MS, MAXIMUM = 109MS, AVERAGE = 74MS PC>
  • 13. CISCO CCNA PORT SECURITY NOW LET’S LOOK AT SHOW RUN: INTERFACE FASTETHERNET0/3 SWITCHPORT MODE ACCESS SWITCHPORT PORT-SECURITY SWITCHPORT PORT-SECURITY MAXIMUM 2 SWITCHPORT PORT-SECURITY MAC-ADDRESS STICKY SWITCHPORT PORT-SECURITY MAC-ADDRESS 2222.2222.2222 SWITCHPORT PORT-SECURITY MAC-ADDRESS STICKY 00D0.D320.E74C
  • 14. CISCO CCNA PORT SECURITY HERE IS BEFORE ANY VIOLATIONS: SW1#SHOW PORT SW1#SHOW PORT-SECURITY INT F0/3 PORT SECURITY : ENABLED PORT STATUS : SECURE-UP VIOLATION MODE : SHUTDOWN AGING TIME : 0 MINS AGING TYPE : ABSOLUTE SECURESTATIC ADDRESS AGING : DISABLED MAXIMUM MAC ADDRESSES : 2 TOTAL MAC ADDRESSES : 2 CONFIGURED MAC ADDRESSES : 1 STICKY MAC ADDRESSES : 1 LAST SOURCE ADDRESS:VLAN : 00D0.D320.E74C:1 SECURITY VIOLATION COUNT : 0
  • 15. CISCO CCNA PORT SECURITY NOW I WILL REMOVE THE CABLE FROM PC3 AND HACKER WILL COME AND CONNECT TO THE PORT F0/3 SW1#SHOW PORT-SECURITY INT F0/3 PORT SECURITY : ENABLED PORT STATUS : SECURE-SHUTDOWN VIOLATION MODE : SHUTDOWN AGING TIME : 0 MINS AGING TYPE : ABSOLUTE SECURESTATIC ADDRESS AGING : DISABLED MAXIMUM MAC ADDRESSES : 2 TOTAL MAC ADDRESSES : 2 CONFIGURED MAC ADDRESSES : 1 STICKY MAC ADDRESSES : 1 LAST SOURCE ADDRESS:VLAN : 00E0.A38B.4828:1 SECURITY VIOLATION COUNT : 1
  • 16. CISCO CCNA PORT SECURITY AS WE SEE I HAVE PORT IN SECURE SHUTDOWN MODE HERE IS ANOTHER SHOW COMMANDS: SW1#SHOW INT F0/3 FASTETHERNET0/3 IS DOWN, LINE PROTOCOL IS DOWN (ERR-DISABLED)
  • 17. CISCO CCNA PORT SECURITY LET’S LOOK AT PORT 1 THAT I DID NOT CONFIGURE PORT SECURITY SW1# SW1#SHOW PORT-SECURITY INT F0/1 PORT SECURITY : DISABLED PORT STATUS : SECURE-DOWN VIOLATION MODE : SHUTDOWN AGING TIME : 0 MINS AGING TYPE : ABSOLUTE SECURESTATIC ADDRESS AGING : DISABLED MAXIMUM MAC ADDRESSES : 1 TOTAL MAC ADDRESSES : 0 CONFIGURED MAC ADDRESSES : 0 STICKY MAC ADDRESSES : 0 LAST SOURCE ADDRESS:VLAN : 0000.0000.0000:0 SECURITY VIOLATION COUNT : 0 AS WE SEE IN THIS CASE I DID NOT ENABLE IT PORT SECURITY; SO I SEE THE FIRST LINE SAYS DISABLED HOW DO YOU FIXED IT? YOU AS ADMINISTRATOR MUST GO TO THAT PORT; GIVE SHUT AND NO SHUT
  • 18. ASM EDUCATIONAL CENTER INC. (ASM) WHERE TRAINING, TECHNOLOGY & SERVICE CONVERGE TO WATCH OUR CISCO CCNA VIDEO TRAININGS PLEASE CHECK OUT THE LINK BELOW: WWW.ASMED.COM/C1 PHONE: (301) 984-7400 ROCKVILLE,MD