Practice: CISCO Switch Port Security

Source: Internet
Author: User
Tags cisco switch

 

For many enterprise network administrators, switches are naturally the most commonly used equipment. So how much do you know about vswitches? Next we will use an example to discuss the practice of vswitch port configuration and access security protection!

 

Scenario: There is a CISCO3550 switch in a certain unit. For the sake of network security, the security requirements for some ports are high, that is, only the specified host can be connected, for example, if you set up an office, only one laptop can access the network. When you take the laptop out, even if the network interface is blank, other computers cannot use the network cable. Next we will look at how network managers gradually achieve this requirement.

 

 

 

I. How to Determine the vswitch port disconnection status

 

As a network administrator, before applying new functions, you must first pass the test. To ensure the stable operation of the network, you can only test new functions on idle ports. It is a way to find an idle port and view it directly before the switch. Of course, as a senior Network Administrator, this is generally not the case, we can find the answer we need by executing corresponding commands on the vswitch. I used the show inter command in the past, but this command displays too much information, which seems inconvenient. Now I am using the show inter status Command, this command displays the disconnected status of each port one by one (expressed by "connected" and "notconnect ), in this example, I found an idle Port 3 through this command for subsequent testing.

 

3550 # show inter status

 

Port Name Status Vlan Duplex Speed Type

 

Fa0/3 huangtun notconnect 66 autoauto 10/100 BaseTX

 

 

 

Ii. Basic Port Security Operations

 

(1) display the MAC address on Port 3

 

3550 # show mac-address-table int fa0/3

 

Mac Address Table

 

-------------------------------------------

 

Vlan Mac Address Type Ports

 

----------------------------

 

(Because no network cable is connected to the port, no MAC address is displayed on the port)

 

(2) Clear dynamically obtained MAC addresses

 

3550 # clear mac-address-table dynamic inter fa0/3

 

The above two steps aim to confirm that there is no MAC address record on the current port, so as to prove that our subsequent operations are valid.

 

(3) Close the port, configure it as the access port, and execute the command to configure Port Security

 

Port security is implemented through the switchport-security command. This is a core command, supplemented by other related commands, we can implement port security settings. Because most of the default settings are used, the function of this example is to allow only one specified MAC address to pass through Port 3 and disable the port in case of security violation, first, explain the related SETUP commands:

 

The switchport port-security command enables port security on the port. By default, only one MAC address is allowed to pass through and the interface is disabled in case of security violation .)

 

The switchport port-security mac-add sticky command informs the switch of the MAC address associated with the port, which will be included in the running configuration. If you save the running configuration to the startup configuration, the IP address is retained after the router is restarted.

 

After introducing the operations on core commands, let's talk about port security operations: first, disable port 3. Use the switchport mode access command to configure the port as the access port for port security configuration. Run the switchport port-securtiy command to enable port security. Then run the swithchport port-security mac-address sticky command to let the port know the IP address of the host on which it connects. Finally, execute the command no shutdown to re-enable the port so that it can be informed of the MAC address of the host. The command to achieve the above operation is as follows.

 

3550 # conf t

 

Enter configuration commands, one per line. End with CNTL/Z.

 

3550 (config) # inter fa0/3

 

3550 (config-if) # shutdown

 

3550 (config-if) # switchport mode access

 

3550 (config-if) # switchport port-security

 

3550 (config-if) # switchport port-security mac-address sticky (set the stickiness of the MAC address, my understanding of this command is that the switch will automatically learn the MAC address of the network device that received the port for the first time and record it to the current configuration file)

 

3550 (config-if) # end

 

(4) view configuration information

 

1. view the FA0/3 port information in the current configuration file.

 

3550 # show run inter fa0/3

 

Building configuration...

 

Current configuration: 281 bytes

 

!

 

Interface FastEthernet0/3

 

Switchport access vlan 66

 

Switchport mode access

 

Switchport port-security

 

Switchport port-security mac-address sticky

 

End

 

2. view the Security Information of port FA0/3.

 

Port Security: Enabled

 

Port Status: Secure-down

 

Violation Mode: Shutdown

 

Aging Time: 0 mins

 

Aging Type: Absolute

 

SecureStatic Address Aging: Disabled

 

Maximum MAC Addresses: 1

 

Total MAC Addresses: 0

 

Configured MAC Addresses: 0

 

Sticky MAC Addresses: 0

 

Last Source Address: 2.16.0000.0000

 

Security Violation Count: 0

 

(5) actual test

 

We took a laptop and connected it to port FA0/3. The status of this laptop Nic is displayed as connection. Because the VLAN66 network segment contains a DHCP server, we can also smoothly obtain the IP address and access the network. Then, connect the network cable connecting the laptop to another computer. The NIC status of the computer is displayed as disconnected, indicating that port security has taken effect.

 

(6) Existing Problems

 

The port security operation has been completed, but when the network cable is inserted back to the laptop, the network is still disconnected, check whether the port is in the "error disable" status. Although we can run the shutdown and no shutdown commands on port FA0/3 to restore the port to normal, this operation is too troublesome, it is also unrealistic. You cannot go to the network manager to execute the shutdown and no shutdonw commands every time you find that the port is closed.

 

 

 

Iii. in-depth research on Port Security Settings

 

Based on the implementation of port security (although there is still a gap between the effect and our requirements), we continue to study the relevant functions and check the port security status's "Violation (illegal) mode ", we found that the default processing is shutdown, so there are no other options. Through" "(help), we really find the other two options, respectively

 

3550 (config-if) # switchport port-security violation

 

Protect Security violation protect mode

 

Restrict Security violation restrict mode

 

Shutdown Security violation shutdown mode

 

By viewing the relevant information, we understand that the protect parameter means that when a security violation occurs, the packet is discarded, which is exactly what we imagine, that is to say, it is not to close the port that violates the rule, but to discard the packet that violates the rule. This is what we want. The specific setting command is as follows:

 

3550 # conf t

 

Enter configuration commands, one per line. End with CNTL/Z.

 

3550 (config) # inter fa0/3

 

3550 (config-if) # shut

 

3550 (config-if) # end

 

3550 # show port-security inter fa0/3

 

Port Security: Enabled

 

Port Status: Secure-down

 

Violation Mode: Protect

 

Aging Time: 0 mins

 

Aging Type: Absolute

 

SecureStatic Address Aging: Disabled

 

Maximum MAC Addresses: 1

 

Total MAC Addresses: 1

 

Configured MAC Addresses: 0

 

Sticky MAC Addresses: 1

 

Last Source Address: 485b. 39b8. a060

 

Security Violation Count: 0

 

The actual test results also meet our requirements. That is, after the port security settings take effect, you can first connect to the laptop to access the network. After changing to a desktop, the NIC status of the desktop is still displayed as connected, but the network data is not available. After the laptop is re-connected, the network communication returns to normal.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.