SlideShare a Scribd company logo
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-1
Ethernet LANs
Understanding
Switch Security
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-2
Common Threats to Physical Installations
 Hardware threats
 Environmental threats
 Electrical threats
 Maintenance threats
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-3
Configuring a Switch Password
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-4
Configuring the Login Banner
 Defines and enables a customized banner to be displayed before
the username and password login prompts.
SwitchX# banner login " Access for authorized users only. Please enter your
username and password. "
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-5
Telnet vs. SSH Access
 Telnet
– Most common access method
– Insecure
 SSH-encrypted
!– The username command create the username and password for the SSH session
Username cisco password cisco
ip domain-name mydomain.com
crypto key generate rsa
ip ssh version 2
line vty 0 4
login local
transport input ssh
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-6
Cisco Catalyst 2960 Series
SwitchX(config-if)#switchport port-security [ mac-address
mac-address | mac-address sticky [mac-address] | maximum
value | violation {restrict | shutdown}]
SwitchX(config)#interface fa0/5
SwitchX(config-if)#switchport mode access
SwitchX(config-if)#switchport port-security
SwitchX(config-if)#switchport port-security maximum 1
SwitchX(config-if)#switchport port-security mac-address sticky
SwitchX(config-if)#switchport port-security violation shutdown
Configuring Port Security
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-7
SwitchX#show port-security [interface interface-id] [address] [ |
{begin | exclude | include} expression]
SwitchX#show port-security interface fastethernet 0/5
Port Security : Enabled
Port Status : Secure-up
Violation Mode : Shutdown
Aging Time : 20 mins
Aging Type : Absolute
SecureStatic Address Aging : Disabled
Maximum MAC Addresses : 1
Total MAC Addresses : 1
Configured MAC Addresses : 0
Sticky MAC Addresses : 0
Last Source Address : 0000.0000.0000
Security Violation Count : 0
Verifying Port Security
on the Catalyst 2960 Series
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-8
SwitchX#sh port-security
Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action
(Count) (Count) (Count)
--------------------------------------------------------------------------
Fa0/5 1 1 0 Shutdown
---------------------------------------------------------------------------
Total Addresses in System (excluding one mac per port) : 0
Max Addresses limit in System (excluding one mac per port) : 1024
SwitchX#sh port-security address
Secure Mac Address Table
-------------------------------------------------------------------
Vlan Mac Address Type Ports Remaining Age
(mins)
---- ----------- ---- ----- -------------
1 0008.dddd.eeee SecureConfigured Fa0/5 -
-------------------------------------------------------------------
Total Addresses in System (excluding one mac per port) : 0
Max Addresses limit in System (excluding one mac per port) : 1024
Verifying Port Security
on the Catalyst 2960 Series (Cont.)
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-9
Securing Unused Ports
 Unsecured ports can create a security hole.
 A switch plugged into an unused port will be added to the
network.
 Secure unused ports by disabling interfaces (ports).
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-10
Disabling an Interface (Port)
shutdown
SwitchX(config-int)#
 To disable an interface, use the shutdown command in interface
configuration mode.
 To restart a disabled interface, use the no form of this command.
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-11
Summary
 The first level of security is physical.
 Passwords can be used to limit access to users that have been
given the password.
 The login banner can be used to display a message before the
user is prompted for a username.
 Telnet sends session traffic in cleartext; SSH encrypts the
session traffic.
 Port security can be used to limit MAC addresses to a port.
 Unused ports should be shut down.
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-12

More Related Content

PPT
CCNA icnd110 s03l03
PPT
CCNA Icnd110 s02l04
PPT
CCNA Icnd110 s02l05
PPT
CCNA Icnd110 s02l07
PPT
CCNA Icnd110 s02l08
PPT
CCNA Icnd110 s02l09
PPT
CCNA Icnd110 s02l02
PPT
CCNA Icnd110 s04l01
CCNA icnd110 s03l03
CCNA Icnd110 s02l04
CCNA Icnd110 s02l05
CCNA Icnd110 s02l07
CCNA Icnd110 s02l08
CCNA Icnd110 s02l09
CCNA Icnd110 s02l02
CCNA Icnd110 s04l01

What's hot (20)

PPT
CCNA Icnd110 s03l02
PPT
CCNA Icnd110 s01l04
PPT
CCNA Icnd110 s03l01
PPT
CCNA Icnd110 s02l03
PPT
CCNA Icnd110 s04l10
PPT
CCNA Icnd110 s04l04
PPT
CCNA Icnd110 s05l02
PPT
CCNA Icnd110 s06l01
PPT
CCNA Icnd110 s04l03
PPT
CCNA Icnd110 s01l06
PPT
CCNA Icnd110 s06l03
PPT
CCNA Icnd110 s05l01
PPT
CCNA Icnd110 s02l01
PPT
Icnd210 s02l04
PPT
CCNA Icnd110 cag
PPT
CCNA Icnd110 s05l05
PPT
CCNA Icnd110 s04l06
PPT
CCNA Icnd110 s01l03
PPT
Icnd210 s03l01
PPT
CCNA Icnd110 s05l04
CCNA Icnd110 s03l02
CCNA Icnd110 s01l04
CCNA Icnd110 s03l01
CCNA Icnd110 s02l03
CCNA Icnd110 s04l10
CCNA Icnd110 s04l04
CCNA Icnd110 s05l02
CCNA Icnd110 s06l01
CCNA Icnd110 s04l03
CCNA Icnd110 s01l06
CCNA Icnd110 s06l03
CCNA Icnd110 s05l01
CCNA Icnd110 s02l01
Icnd210 s02l04
CCNA Icnd110 cag
CCNA Icnd110 s05l05
CCNA Icnd110 s04l06
CCNA Icnd110 s01l03
Icnd210 s03l01
CCNA Icnd110 s05l04
Ad

Viewers also liked (18)

PPT
Icnd210 s06l01
PPT
Icnd210 s08l04
PPT
CCNA Icnd110 s04l07
PPT
CCNA Icnd110 s01l08
PPT
Icnd210 cag
PPT
Icnd210 s04l03
PPT
CCNA Icnd110 s04l08
PPT
CCNA Icnd110 lg
PPT
CCNA Icnd110 s05l03
PDF
Icnd210 sg vol 2
PPT
Icnd210 s01l01
PPT
CCNA Icnd110 s01l07
PPT
Icnd210 s08l03
PPT
Icnd210 s04l01
PPT
CCNA Icnd110 s01l02
PPT
Icnd210 s02l02
PPT
Icnd210 lg
PPT
Icnd210 s07l03
Icnd210 s06l01
Icnd210 s08l04
CCNA Icnd110 s04l07
CCNA Icnd110 s01l08
Icnd210 cag
Icnd210 s04l03
CCNA Icnd110 s04l08
CCNA Icnd110 lg
CCNA Icnd110 s05l03
Icnd210 sg vol 2
Icnd210 s01l01
CCNA Icnd110 s01l07
Icnd210 s08l03
Icnd210 s04l01
CCNA Icnd110 s01l02
Icnd210 s02l02
Icnd210 lg
Icnd210 s07l03
Ad

Similar to CCNA Icnd110 s02l06 (20)

PPTX
CCNA2 Verson6 Chapter5
PPTX
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
DOCX
TitleABC123 Version X1Film ListPSYCH650 Version 2.docx
PPTX
PC LEESOON 6.pptx
PPTX
CCNA_RSE_Chp5 Switch Configuration For Network
PPTX
Chapter 13 : Introduction to switched networks
PPT
Day 13.1 startingaswitch
PDF
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
PPTX
KPUCC-Rs instructor ppt_chapter2_final
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 2
PPTX
CCNA RS_NB - Chapter 2
PDF
ccna1 v5 cap2
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 2
PDF
Securing Switch Access
PPTX
Cisco CCNA Port Security
PPTX
CCNA RS_ITN - Chapter 2
PDF
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
PPTX
Chapter 2 : Configuring a network operating system
PPTX
1627478708347_Chapter 1.pptx
PPT
CCNA Exploration 3 - Chapter 2
CCNA2 Verson6 Chapter5
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
TitleABC123 Version X1Film ListPSYCH650 Version 2.docx
PC LEESOON 6.pptx
CCNA_RSE_Chp5 Switch Configuration For Network
Chapter 13 : Introduction to switched networks
Day 13.1 startingaswitch
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
KPUCC-Rs instructor ppt_chapter2_final
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA RS_NB - Chapter 2
ccna1 v5 cap2
CCNA 1 Routing and Switching v5.0 Chapter 2
Securing Switch Access
Cisco CCNA Port Security
CCNA RS_ITN - Chapter 2
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
Chapter 2 : Configuring a network operating system
1627478708347_Chapter 1.pptx
CCNA Exploration 3 - Chapter 2

More from computerlenguyen (18)

PPT
Icnd210 s08l05
PPT
Icnd210 s08l02
PPT
Icnd210 s08l01
PPT
Icnd210 s07l02
PPT
Icnd210 s07l01
PPT
Icnd210 s06l03
PPT
Icnd210 s06l02
PPT
Icnd210 s05l03
PPT
Icnd210 s05l02
PPT
Icnd210 s04l02
PPT
Icnd210 s03l03
PPT
Icnd210 s03l02
PPT
Icnd210 s02l06
PPT
Icnd210 s02l05
PPT
Icnd210 s02l03
PPT
Icnd210 s02l01
PPT
Icnd210 s01l02
PPT
Eigrp authentication
Icnd210 s08l05
Icnd210 s08l02
Icnd210 s08l01
Icnd210 s07l02
Icnd210 s07l01
Icnd210 s06l03
Icnd210 s06l02
Icnd210 s05l03
Icnd210 s05l02
Icnd210 s04l02
Icnd210 s03l03
Icnd210 s03l02
Icnd210 s02l06
Icnd210 s02l05
Icnd210 s02l03
Icnd210 s02l01
Icnd210 s01l02
Eigrp authentication

Recently uploaded (20)

PPTX
Pharma ospi slides which help in ospi learning
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
01-Introduction-to-Information-Management.pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Trump Administration's workforce development strategy
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
RMMM.pdf make it easy to upload and study
PDF
Yogi Goddess Pres Conference Studio Updates
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
Pharma ospi slides which help in ospi learning
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Chinmaya Tiranga quiz Grand Finale.pdf
Final Presentation General Medicine 03-08-2024.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Complications of Minimal Access Surgery at WLH
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
01-Introduction-to-Information-Management.pdf
Weekly quiz Compilation Jan -July 25.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
2.FourierTransform-ShortQuestionswithAnswers.pdf
Trump Administration's workforce development strategy
STATICS OF THE RIGID BODIES Hibbelers.pdf
GDM (1) (1).pptx small presentation for students
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
RMMM.pdf make it easy to upload and study
Yogi Goddess Pres Conference Studio Updates
O5-L3 Freight Transport Ops (International) V1.pdf

CCNA Icnd110 s02l06

  • 1. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-1 Ethernet LANs Understanding Switch Security
  • 2. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-2 Common Threats to Physical Installations  Hardware threats  Environmental threats  Electrical threats  Maintenance threats
  • 3. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-3 Configuring a Switch Password
  • 4. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-4 Configuring the Login Banner  Defines and enables a customized banner to be displayed before the username and password login prompts. SwitchX# banner login " Access for authorized users only. Please enter your username and password. "
  • 5. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-5 Telnet vs. SSH Access  Telnet – Most common access method – Insecure  SSH-encrypted !– The username command create the username and password for the SSH session Username cisco password cisco ip domain-name mydomain.com crypto key generate rsa ip ssh version 2 line vty 0 4 login local transport input ssh
  • 6. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-6 Cisco Catalyst 2960 Series SwitchX(config-if)#switchport port-security [ mac-address mac-address | mac-address sticky [mac-address] | maximum value | violation {restrict | shutdown}] SwitchX(config)#interface fa0/5 SwitchX(config-if)#switchport mode access SwitchX(config-if)#switchport port-security SwitchX(config-if)#switchport port-security maximum 1 SwitchX(config-if)#switchport port-security mac-address sticky SwitchX(config-if)#switchport port-security violation shutdown Configuring Port Security
  • 7. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-7 SwitchX#show port-security [interface interface-id] [address] [ | {begin | exclude | include} expression] SwitchX#show port-security interface fastethernet 0/5 Port Security : Enabled Port Status : Secure-up Violation Mode : Shutdown Aging Time : 20 mins Aging Type : Absolute SecureStatic Address Aging : Disabled Maximum MAC Addresses : 1 Total MAC Addresses : 1 Configured MAC Addresses : 0 Sticky MAC Addresses : 0 Last Source Address : 0000.0000.0000 Security Violation Count : 0 Verifying Port Security on the Catalyst 2960 Series
  • 8. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-8 SwitchX#sh port-security Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action (Count) (Count) (Count) -------------------------------------------------------------------------- Fa0/5 1 1 0 Shutdown --------------------------------------------------------------------------- Total Addresses in System (excluding one mac per port) : 0 Max Addresses limit in System (excluding one mac per port) : 1024 SwitchX#sh port-security address Secure Mac Address Table ------------------------------------------------------------------- Vlan Mac Address Type Ports Remaining Age (mins) ---- ----------- ---- ----- ------------- 1 0008.dddd.eeee SecureConfigured Fa0/5 - ------------------------------------------------------------------- Total Addresses in System (excluding one mac per port) : 0 Max Addresses limit in System (excluding one mac per port) : 1024 Verifying Port Security on the Catalyst 2960 Series (Cont.)
  • 9. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-9 Securing Unused Ports  Unsecured ports can create a security hole.  A switch plugged into an unused port will be added to the network.  Secure unused ports by disabling interfaces (ports).
  • 10. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-10 Disabling an Interface (Port) shutdown SwitchX(config-int)#  To disable an interface, use the shutdown command in interface configuration mode.  To restart a disabled interface, use the no form of this command.
  • 11. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-11 Summary  The first level of security is physical.  Passwords can be used to limit access to users that have been given the password.  The login banner can be used to display a message before the user is prompted for a username.  Telnet sends session traffic in cleartext; SSH encrypts the session traffic.  Port security can be used to limit MAC addresses to a port.  Unused ports should be shut down.
  • 12. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-12

Editor's Notes

  • #4: <number> Layer 2 of 2 Emphasize: The router has one enable password. Remember that this is your only protection. Whoever owns this password can do anything with the router, so be careful about communicating this password to others. To provide an additional layer of security, particularly for passwords that cross the network or are stored on a TFTP server, you can use either the enable password or enable secret commands. Both commands accomplish the same thing; that is, they allow you to establish an encrypted password that users must enter to access enable mode (the default), or any privilege level you specify. Cisco recommends that you use the enable secret command because it uses an improved encryption algorithm. Use the enable password command only if you boot an older image of the Cisco IOS software, or if you boot older boot ROMs that do not recognize the enable secret command. If you configure the enable secret password, it is used instead of the enable password, not in addition to it. Cisco supports password encryption. Turn on password encryption using the service password-encryption command. Then enter the desired passwords for encryption. Immediately, on the next line, enter the no service password-encryption command. Only those passwords that are set between the two commands will be encrypted. If you enter service password-encryption and then press Ctrl-Z to exit, all passwords will be encrypted. Note: Password recovery is not covered in the course materials. Refer the students to the IMCR class.
  • #7: <number> Layer 2 of 2 Note: When the switch-sticky learns a MAC address on a secured port, the switch will make that MAC address a permanent address.
  • #8: <number> Layer 2 of 2 Emphasize: The default action is “suspend.”
  • #9: <number> Layer 2 of 2 Emphasize: The default action is “suspend.”