Secure Your Network Master Switch Security Configu

Learn how to secure your network switches from internal threats using port security, VLAN, DHCP, ARP, and STP protection techniques in CCNA2 v7.0 Module 11: Switch Security Configuration.

Mason Bennett
Contributor
4.0
52
3 months ago
Preview (12 of 38)
Sign in to access the full document!
CCNA2 v7.0 Curriculum: Module 11 - Switch
Security Configuration
11.0 Introduction
11.0.1 Why should I take this module?
Welcome to Switch Security Configuration!
An important part of your responsibility as a network professional is to keep the
network secure. Most of the time we only think about security attacks coming
from outside the network, but threats can come from within the network as well.
These threats can range anywhere from an employee innocently adding an
Ethernet switch to the corporate network so they can have more ports, to
malicious attacks caused by a disgruntled employee. It is your job to keep the
network safe and ensuring that business operations continue uncompromised.
How do we keep the network safe and stable? How do we protect it from
malicious attacks from within the network? How do we make sure employees are
not adding switches, servers and other devices to the network that might
compromise network operations?
This module is your introduction to keeping your network secure from within!
11.0.2 What will I learn in this module?
Module Title: Switch Security Configuration
Module Qbjective: ____Configure switch security to mitigate LAN attacks.
Topic Title Topic Objective
Implement Port
Security Implement port security to mitigate MAC address table attacks.
Mitigate VLAN
Attacks
Explain how to configure DTP and native VLAN to mitigate VLAN
attacks.
Mitigate DHCP
Attacks
Explain how to configure DHCP snooping to mitigate DHCP
attacks.
Mitigate ARP Attacks Explain how to configure ARP inspection to mitigate ARP attacks.
Topic Title Topic Objective
Mitigate STP Attacks
Explain how to configure PortFast and BPDU Guard to mitigate
STP attacks.
11.1 Implement Port Security
11.1.1 Secure Unused Ports
Layer 2 devices are considered to be the weakest link in a company's security
infrastructure. Layer 2 attacks are some of the easiest for hackers to deploy but
these threats can also be mitigated with some common Layer 2 solutions.
All switch ports (interfaces) should be secured before the switch is deployed for
production use. How a port is secured depends on its function.
A simple method that many administrators use to help secure the network from
unauthorized access is to disable all unused ports on a switch. For example, if a
Catalyst 2960 switch has 24 ports and there are three Fast Ethernet connections
in use, it is good practice to disable the 21 unused ports. Navigate to each
unused port and issue the Cisco IOS shutdown command. If a port must be
reactivated at a later time, it can be enabled with the no shutdown command.
To configure a range of ports, use the interface range command.
Switch(config)# interface range type module/first-number - last-
number
For example, to shutdown ports for Fa0/8 through FaO/24 on SI, you would enter
the following command.
SI (config)# interface range faO/8 - 24
S1(config-if-range)# shutdown
%LINK-5-CHANGED: Interface FastEthemetO/8, changed state to
administratively down
(output omitted)
%LINK-5-CHANGED: Interface FastEthemetO/24, changed state
to administratively down
S1(config-if-range)#
11.1.2 Mitigate MAC Address Table Attacks
The simplest and most effective method to prevent MAC address table overflow
attacks is to enable port security.
Port security limits the number of valid MAC addresses allowed on a port. It
allows an administrator to manually configure MAC addresses for a port or to
permit the switch to dynamically learn a limited number of MAC addresses. When
a port configured with port security receives a frame, the source MAC address of
the frame is compared to the list of secure source MAC addresses that were
manually configured or dynamically learned on the port.
By limiting the number of permitted MAC addresses on a port to one, port
security can be used to control unauthorized access to the network, as shown in
the figure.
Note : MAC addresses are shown as 24 bits for simplicity.
11.1.3 Enable Port Security
Notice in the example, the switchport port-security command was
rejected. This is because port security can only be configured on manually

Loading page 6...

Loading page 7...

Loading page 8...

Loading page 9...

Loading page 10...

Loading page 11...

Loading page 12...

9 more pages available. Scroll down to load them.

Preview Mode

Sign in to access the full document!

100%

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Document Details

Related Documents

View all