Switchport port-security
Security feature
- allows to limit maximum number of devices
- to control type / vendor of devices connected to switch
- Violations
- MAC categories
- Causes of violations
- Causes of violations
********************************************************************************
Switchport Violations
Before getting into the mechanics of how switchport security operates; it is important to review what happens should a violation occur. On Cisco equipment there are three different main violation types: shutdown, protect, and restrict. These are described in more detail below:- Shutdown – When a violation occurs in this mode, the switchport will be taken out of service and placed in the err-disabled state. The switchport will remain in this state until manually removed; this is the default switchport security violation mode.
- Protect – When a violation occurs in this mode, the switchport will
permit traffic from known MAC addresses to continue sending traffic
while dropping traffic from unknown MAC addresses. When using this mode,
no notification message is sent when this violation occurs.
- Restrict – When a violation occurs in this mode, the switchport will permit traffic from known MAC addresses to continue sending traffic while dropping traffic from unknown MAC addresses. However, unlike the protect violation type, a message is also sent indicating that a violation has occurred.
Switchport Security MAC Addresses
When using the switchport security feature, source MAC addresses are separated into three different categories, these include:- Static – Static secure MAC addresses are statically configured on each switchport and stored in the address table. The configuration for a static secure MAC address is stored in the running configuration by default and can be made permanent by saving them to the startup configuration.
- Dynamic – Dynamic secure MAC addresses are learned from the device (or devices) connected to the switchport. These addresses are stored in the address table only and will be lost when the switchport state goes down or when the switch reboots.
- Sticky – Sticky secure MAC addresses are a hybrid. They are learned dynamically from the devices connected to the switchport, are put into the address table AND are entered into the running configuration as a static secure MAC address (sometimes referred to as a static sticky MAC address). Like a static secure MAC address, these MAC addresses will be lost unless saved to the startup confi
- guration.
**********************************************************************************
What causes a Switchport Violation?
-
The next question to ask is what causes a switchport violation; there
are two situations that can cause a violation, these two situations
include:
- When the maximum number of secure MAC addresses has been added to a switchport’s address table and traffic from another MAC address is received on the switchport.
- When an address that has been seen on a secure switchport has already been seen on another secure switchport in the same VLAN.
By default, dynamic MAC entries in the address table will never time out (dynamic is the default method used for learning secure MAC addresses) as long as the switchport state remains up.
*********************************************************************************
Tshooting port security violation
When using dynamic MAC addresses
- engineers must physically disconnect the cable or shutdown the switchport to reset the dynamic entries in the address table.
When using sticky MAC addresses
- the MAC address has to be manually removed from the running config or the switch must be rebooted to remove the contents from the address table.
If static secure MAC address
- must be manually removed from the running config to allow remove from the MAC address table. After that the device with a new MAC address can be connected to the switchport
----------------------------------------------------
Author's note:
DIY WiFi Microcontroller for hacking |
Port security is very useful and NetOps Engineers should check more deeply in case that no device is found, alarms are raising OOBH etc.
With a raise of IoT even very small devices can do almost miracles
- See for example http://raspberrypi.com
Computer of creditcard size
No comments:
Post a Comment
Thank you for your comment. Will try to react as soon as possible.
Regards,
Networ King