SWITCHPORT SECURITY

 

 

SWITCHHPORT SECURITY

1. PORT SECURITY ENABLES YOU TO CONFIGURE EACH SWITCH PORT WITH A UNIQUE LIST OF THE MAC ADDRESSES OF DEVICES THAT ARE AUTHORIZED TO ACCESS THE NETWORK THROUGH THAT PORT.

THIS SECURITY ENABLES INDIVIDUAL PORTS TO DETECT, PREVENT, AND LOG ATTEMPTS BY UNAUTHORIZED DEVICES TO COMMUNICATE THROUGH THE SWITCH.

2. SWITCH PORT SECURITY LIMITS THE NUMBER OF VALID MAC ADDRESSES ALLOWED ON A PORT. 

WHEN A MAC ADDRESS, OR A GROUP OF MAC ADDRESSES ARE CONFIGURED TO ENABLE SWITCH PORT SECURITY, THE SWITCH WILL FORWARD PACKETS ONLY TO THE DEVICES USING THOSE MAC ADDRESSES.

3. BY USING PORT SECURITY YOU CAN SECURE YOUR NETWORK FOR HACKER ATTACKE AND PROTECT YOUR NETWORK INFORMATION AND TRAFFIC.

TYPES OF VOILATION IN PORT SECURITY

1. SHUTDOWN

IN THIS VIOLATION  WHENEVER AN ATTACKER ATTACH TO YOUR NETWORK  TO COMMUNICATE, THE ATTACKER WITH WHOM IT IS ATTACHED TO YOUR SWITCH PORT WILL BE SHUTDOWN THIS PORT WHEN IT STARTS COMMUNICATING.

2. RESTRICT

IN THIS VIOLATION, THE SWITCH SENDS AN ALERT MESSAGE TO THE NETWORK ADMINISTRATOR FOR ABOUT ATTACKER.

3. PROTECT

IN THIS VIOLATION, THOUGHT ALLOWS ONLY THE PORT THAT IS CONFIGURED TO SWITCH AND DOES NOT ALLOW COMMUNICATION TO ANY OTHER PORT.

TYPES OF LOCK

1. DYNAMIC LOCK

IN THIS CONFIGURATION , THE PORTS MAC ADDRESS IS AUTOMATICALLY SECURED.

2. STATIC LOCK

IN CONFIGURATION  THIS LOCK WE SECURE THE MAC ADDRESS ITSELF.

__________________

CONFIGURATION

STEP 1 

1. IN THIS STEP WE WILL TAKE A 2 SWITCHES AND  5 COMPUTERS AND AND ONE  LAPTOP FOR EXAMPLE LAPTOP IS ATTACKER.

2. ASSIGN A IP ADDRESS IN ALL DEVICES.

STEP 2

1.  CONFIGURATION SWITCH PORT SECURITY

2. ALL VOILATION CONFIGURED STEP BY STEP

3. LOCK CONFIGURATION

_____________________

STEP 1

1. IN THIS STEP WE WILL TAKE A 2 SWITCHES AND 5 COMPUTERS AND AND ONE  LAPTOP FOR EXAMPLE LAPTOP IS ATTACKER.

2. ASSIGN A IP ADDRESS IN ALL DEVICES.


STEP 2

CONFOGURATION PORT SECURITY WITH STATIC LOCK AND VOILATION IS SHUTDOWN.

PORT SECURITY CONFIGURE ON PC-1 MACE ADDRESS

GO TO SWITCH(0) CONFIGURATION MODE AND ENTER THIS COMMANDS.

Switch(config)# inter fa0/1
Switch(config-if)# switchport mode access 
Switch(config-if)# switchport port-security 
Switch(config-if)# switchport port-security mac-address ?

WE ARE CONFIGURING THE STATIC LOG SO WE HAVE TO WRITE THE MAC-ADDRESS OF THE PC.

Switch(config-if)# switchport port-security mac-address 0060.474a.8d1e

AND VOILATION CONFIGURE IS SHUTDOWN SO WRITE A SHUTDOWN IN COMMANDS.

Switch(config-if)# switchport port-security Violation ?

Switch(config-if)# switchport port-security Violation shutdown
Switch(config-if)# switchport port-security maximum 1

"MAXIMUM MEANS THAT WHEN WE CONFIGURE MAXIMUM NUMBER IS 2 EVER JUST 2 HOST CONNECTING WITH HIS  INTER FA0/1  PORTS.

WHEN HIS NUMBER ENTER 3 JUST 3 HOST ATTACHED HIS PORT."

GO TO ENABLE MODE OF SWITCH (0) AND ENTER COMMANDS.

Switch# sh port-security interface fa0/1


Switch# sh port-security address


AFTER THIS WHEN YOU WILL CONNECT PC-1 CABLE WITH ATTACK LAPTOP AND YOU WILL ASSIGN IP ADDRESS TO THAT  THEN THAT CABLE WILL AUTOMATICALLY SHUTDOWN.

______________

 GO  TO SWITCH 1

CONFIGURE PORT SECURITY FROM SWITCH (1) CONFIGURATION MODE AND ENTER HIS COMMANDS.


Switch(config)# inter fa0/2
Switch(config-if)# switchport mode access 
Switch(config-if)# switchport port-security 
Switch(config-if)# switchport port-security mac-address ?

WE ARE CONFIGURING THE DYNAMIC LOG SO WE HAVE TO WRITE THE MAC-ADDRESS OF THE PC.

Switch(config-if)# switchport port-security mac-address sticky
Switch(config-if)# switchport port-security Violation shutdown
Switch(config-if)# switchport port-security maximum 5

GO TO ENABLR MODE SWITCH  (1)

Switch# sh port-security

WHEN YOU PLUG THE  ATTACKER LAPTOP WITH ANY PORT OF SWITCH 1 AND ASSIGN AN IP ADDRESS TO THE LAPTOP, THEN THAT LAPTOP WILL NOT BE ABLE TO COMMUNICATE WITH YOUR NETWORK IN ANY WAY.

ATTAKER PING PC-3


_________________________

Comments