
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Switch Port Security Archives - TECHNIG</title>
	<atom:link href="https://www.technig.com/tag/switch-port-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.technig.com/tag/switch-port-security/</link>
	<description>Gateway for IT Experts and Tech Geeks</description>
	<lastBuildDate>Sun, 29 Mar 2020 11:19:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>

<image>
	<url>https://www.technig.com/wp-content/uploads/2020/04/32x32.png</url>
	<title>Switch Port Security Archives - TECHNIG</title>
	<link>https://www.technig.com/tag/switch-port-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">162720667</site>	<item>
		<title>How to Configure Switch Port Security on Cisco Switches?</title>
		<link>https://www.technig.com/configure-switch-port-security-cisco-switches/</link>
					<comments>https://www.technig.com/configure-switch-port-security-cisco-switches/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Wed, 09 May 2018 05:00:34 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Certification]]></category>
		<category><![CDATA[CCNA Lab Manual]]></category>
		<category><![CDATA[CCNA Packet Tracer Lab]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Switch Port Security]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=14693</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Switch Port Security on Cisco Switch - Technig" decoding="async" fetchpriority="high" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig.jpg 840w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>This article describes how to configure switch port security on Cisco Switches. It provides guidelines, procedures, and configuration examples. To practice and learn to configure port security on Cisco switch, just download the port security packet tracer lab or create your own lab and follow the switch port security configuration guideline. Download Switch Port Security [&#8230;]</p>
<p>The post <a href="https://www.technig.com/configure-switch-port-security-cisco-switches/">How to Configure Switch Port Security on Cisco Switches?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Switch Port Security on Cisco Switch - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig.jpg 840w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>This article describes how to configure switch port security on Cisco Switches. It provides guidelines, procedures, and configuration examples. To practice and learn to configure port security on Cisco switch, just download the port security packet tracer lab or create your own lab and follow the switch port security configuration guideline.</p>
<p><strong>Download</strong> <a href="https://www.technig.com/wp-content/uploads/2018/05/Configure-Port-Security-on-Cisco-Switches-Technig.zip" target="_blank" rel="noopener noreferrer">Switch Port Security Configuration</a> Packet Tracer Lab.</p>
<figure id="attachment_14695" aria-describedby="caption-attachment-14695" style="width: 841px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-Switch-Port-Security-on-Cisco-Switches-Technig.jpg"><img decoding="async" class="wp-image-14695 size-full" src="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-Switch-Port-Security-on-Cisco-Switches-Technig.jpg" alt="How to Configure Switch Port Security on Cisco Switches - Technig" width="841" height="490" srcset="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-Switch-Port-Security-on-Cisco-Switches-Technig.jpg 841w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-Switch-Port-Security-on-Cisco-Switches-Technig-300x175.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-Switch-Port-Security-on-Cisco-Switches-Technig-768x447.jpg 768w" sizes="(max-width: 841px) 100vw, 841px" /></a><figcaption id="caption-attachment-14695" class="wp-caption-text">How to Configure Switch Port Security on Cisco Switches &#8211; Technig</figcaption></figure>
<h2 class="p_H_Head1">Port Security Guidelines and Restrictions</h2>
<p class="pB1_Body1">Follow these guidelines when configuring port security.</p>
<ul style="list-style-type: circle;">
<li class="pBu1_Bullet1">A secure port cannot be a trunk port.</li>
<li class="pBu1_Bullet1">A secure port cannot be a destination port for Switch Port Analyzer (SPAN).</li>
<li class="pBu1_Bullet1">A secure port cannot belong to an EtherCha<img decoding="async" style="text-transform: initial;" src="https://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" alt="" width="19" height="2" border="0" /><span style="text-transform: initial;">nnel port-channel interface.</span></li>
<li class="pBu1_Bullet1">A secure port and static MAC address configuration are mutually exclusive.</li>
</ul>
<h2 class="p_H_Head1">Configure Switch Port Security</h2>
<p class="pB1_Body1">These sections describe how to configure port security using the Packet Tracer &#8211; Configuring Switch Port Security Lab.</p>
<p>In this activity, you will configure and verify port security on a switch. Port security allows you to restrict a port’s ingress traffic by limiting the MAC addresses that are allowed to send traffic to the port.</p>
<p><strong>Part 1:</strong> Configure Port Security</p>
<p>a. Access the command line for S1 and enable port security on Fast Ethernet ports 0/1 and 0/2.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">SW1&gt;enable 
SW1#configure terminal 
Enter configuration commands, one per line.  End with CNTL/Z.
SW1(config)#interface range fastEthernet 0/1-2
SW1(config-if-range)#switchport mode access 
SW1(config-if-range)#
SW1(config-if-range)#switchport port-security 
SW1(config-if-range)#</pre>
<p>b. Set the maximum so that only one device can access the Fast Ethernet ports 0/1 and 0/2.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">SW1(config-if-range)#switchport port-security maximum 1
SW1(config-if-range)#</pre>
<p>c. Secure the ports so that the MAC address of a device is dynamically learned and added to the running configuration.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">SW1(config-if-range)#switchport port-security mac-address sticky 
SW1(config-if-range)#</pre>
<p>d. Set the violation so that the Fast Ethernet ports 0/1 and 0/2 are not disabled when a violation occurs, but packets are dropped from an unknown source.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">SW1(config-if-range)#switchport port-security violation restrict 
SW1(config-if-range)#</pre>
<p>e. Disable all the remaining unused ports. Hint: Use the range keyword to apply this configuration to all the ports simultaneously.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">SW1(config)#interface range fastEthernet 0/3-24, gigabitEthernet 0/1-2
SW1(config-if-range)#shutdown</pre>
<p>It&#8217;s all and enough to configure switch port security on this lab. Let&#8217;s test it.</p>
<p><strong>Part 2:</strong> Verify Port Security</p>
<p>Try to test your switch port security configuration with ping command and testing with the rogue laptop on the lab</p>
<ul>
<li>a. From PC1, ping PC2.</li>
<li>b. Verify port security is enabled and the MAC addresses of PC1 and PC2 were added to the running configuration with &#8220;<strong>show run</strong>&#8221; command.</li>
<li>c. Attach Rogue Laptop to any unused switch port and notice that the link lights are red.</li>
<li>d. Enable the port and verify that Rogue Laptop can ping PC1 and PC2. After verification shut down the port connected to Rogue Laptop.</li>
<li>e. Disconnect PC2 and connect Rogue Laptop to PC2’s port. Verify that Rogue Laptop is unable to ping PC1.</li>
<li>f. Display the port security violations for the port Rogue Laptop is connected to.</li>
<li>g. Disconnect Rouge Laptop and reconnect PC2. Verify PC2 can ping PC1.</li>
<li>h. Why is PC2 able to ping PC1, but the Rouge Laptop is not?</li>
</ul>
<p>That&#8217;s all, you need to learn about to configure switch port security on Cisco switches. If you need to study more about switch port security, try to read a book or simply read the below materials.</p>
<h3 class="p_H_Head1">Default Port Security Configuration</h3>
<table id="wp1047723table1047720" border="1" width="80%" cellspacing="0" cellpadding="3">
<tbody>
<tr align="left" valign="bottom">
<th scope="col">
<section class="pCH1_CellHead1">Feature</section>
</th>
<th scope="col">
<section class="pCH1_CellHead1">Default Setting</section>
</th>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Port security</p>
</td>
<td>
<p class="pB1_Body1">Disabled on a port</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Maximum number of secure MAC addresses</p>
</td>
<td>
<p class="pB1_Body1">1</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Violation mode</p>
</td>
<td>
<p class="pB1_Body1">Shutdown. The port shuts down when the maximum number of secure MAC addresses is exceeded, and an SNMP trap notification is sent.</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Aging</p>
</td>
<td>
<p class="pB1_Body1">Disabled</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Aging type</p>
</td>
<td>
<p class="pB1_Body1">Absolute</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Static Aging</p>
</td>
<td>
<p class="pB1_Body1">Disabled</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Sticky</p>
</td>
<td>
<p class="pB1_Body1">Disabled</p>
</td>
</tr>
</tbody>
</table>
<h2 class="p_H_Head1">Overview of Configure Switch Port Security</h2>
<p class="pBu1_Bullet1">You can configure MAC addresses to be sticky. These can be dynamically learned or manually configured, stored in the address table, and added to the running configuration. If these addresses are saved in the configuration file, the interface does not need to dynamically relearn them when the switch restarts. Although sticky secure addresses can be manually configured, it is not recommended.</p>
<p class="pB1_Body1">You can configure an interface to convert the dynamic MAC addresses to sticky secure MAC addresses and to add them to the running configuration by enabling <em class="cEmphasis">sticky learning</em>. To enable sticky learning, enter the <b class="cBold">switchport</b> <b class="cBold">port-security mac-address sticky</b> command. When you enter this command, the interface converts all the dynamic secure MAC addresses, including those that were dynamically learned before sticky learning was enabled, to sticky secure MAC addresses.</p>
<p class="pB1_Body1">The sticky secure MAC addresses do not automatically become part of the configuration file, which is the startup<em class="cEmphasis"> </em>configuration used each time the switch restarts. If you save the sticky secure MAC addresses in the configuration file, when the switch restarts, the interface does not need to relearn these addresses. If you do not save the configuration, they are lost</p>
<p class="pB1_Body1">If sticky learning is disabled, the sticky secure MAC addresses are converted to dynamic secure addresses and are removed from the running configuration.</p>
<p class="pB1_Body1">After the maximum number of secure MAC addresses is configured, they are stored in an address table. To ensure that an attached device has the full bandwidth of the port, configure the MAC address of the attached device and set the maximum number of addresses to one, which is the default.</p>
<p class="pB1_Body1">A security violation occurs if the maximum number of secure MAC addresses has been added to the address table and a workstation whose MAC address is not in the address table attempts to access the interface.</p>
<p class="pB1_Body1">You can configure the interface for one of these violation modes, based on the action to be taken if a violation occurs:</p>
<ul>
<li class="pBu1_Bullet1"><strong>Restrict</strong>—A port security violation restricts data, causes the SecurityViolation counter to increment, and causes an SNMP Notification to be generated. The rate at which SNMP traps are generated can be controlled by the SNMP-server enable traps port-security trap-rate command. The default value (&#8220;0&#8221;) causes an SNMP trap to be generated for every security violation.</li>
<li class="pBu1_Bullet1"><strong>Shutdown</strong>—A port security violation causes the interface to shut down immediately. When a secure port is in the error-disabled state, you can bring it out of this state by entering the <b class="cBold">errdisable recovery cause</b> psecure-violation global configuration command or you can manually re-enable it by entering the <b class="cBold">shutdown</b> and <b class="cBold">no shutdown</b> interface configuration commands. This is the default mode.</li>
</ul>
<p class="pB2_Body2">You can also customize the time to recover from the specified error-disable cause (default is 300 seconds) by entering the <b class="cBold">errdisable recovery interval </b>command.</p>
<p>Source: <a href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ew/configuration/guide/conf/port_sec.html" target="_blank" rel="noopener noreferrer">Cisco</a></p>
<h3>Related Search Queries:</h3>
<ul>
<li>Cisco port security violation</li>
<li>Switchport port-security maximum 2</li>
<li>Cisco port security violation options</li>
<li>Switchport port-security violation restrict vs protect</li>
<li>Port security configuration in packet tracer</li>
<li>Switchport port-security mac-address sticky</li>
<li>Port security in networking</li>
<li>Port security pdf</li>
<li>Switchport port-security maximum</li>
<li>Switchport port-security violation restrict vs protect</li>
<li>Cisco port security violation options</li>
<li>Switchport port-security mac-address sticky</li>
</ul>
<p>The post <a href="https://www.technig.com/configure-switch-port-security-cisco-switches/">How to Configure Switch Port Security on Cisco Switches?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/configure-switch-port-security-cisco-switches/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14693</post-id>	</item>
	</channel>
</rss>
