User Tools

Site Tools


icnd1:switchport_security

Switchport Security

An attempt at securing the physical ports on cisco switches by denying access based on the MAC address of the connected device. Each port has it's own collection of acceptable MAC addresses with which to permit traffic that can be automatically or manually specified as well as the action taken upon violation of the switchport sec configuration.

Violation Actions:


  • Shutdown (DEFAULT)
    • Port shuts down immediately. When in error-disabled-state you can ressurect the port with errdisable recovery cause psecure-violation (global config) OR manually toggle up status on the interface with shutdown, no shutdown (int config).
  • Restrict
    • Causes SecurityViolation counter to increment, and generates an SNMP notification. Rate of SNMP traps are created can be altered by snmp-server enable traps port-security trap-rate command. Default val is 0, causing SNMP trap to generate on every violation.

Configuration


Switchport security cannot be enabled on dynamic port types.

  • Int FA01
  • swport mode access
  • enable port sec
  • port sec max address to store is 1
  • mac-addres stick, auto learn the next mac address on this port.
  • violation mode set to shutdown.
  • Show command to verify configuration on fa0/1.
Switch(config)#interface fastEthernet 0/1
Switch(config-if)#switchport mode access 
Switch(config-if)#switchport port-security 
Switch(config-if)#switchport port-security maximum 1
Switch(config-if)#switchport port-security mac-address sticky 
Switch(config-if)#switchport port-security violation shutdown
Switch(config-if)#do show port int fa0/1
icnd1/switchport_security.txt · Last modified: 2024/04/15 03:49 by 114.119.130.33