SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
192.168.20.0/30 .1
.2
Restrict
Switch Port Security
Shutdown | Restrict | Protect
Switchport security-part-01
Violation: shutdown
Step 1: Enter interface configuration mode and input the physical interface to
configure. We will be using FastEthernet 0/2 as an example.
Switch(config)# interface FastEthernet 0/2
Step 2: Set the interface mode to access. The default mode, which is
dynamic desirable, cannot be configured to be a secured port.
Switch(config-if)# switchport mode access
Step 3: Enable port security on the interface.
Switch(config-if)# switchport port-security
Step 4: Set the maximum number of secure MAC addresses for the interface, which ranges from 1 to 3072,
wherein the default value is 1.
Switch(config-if)# switchport port-security maximum {1-3072}
Switch port Action During
the Port security Violation
Protect Restrict Shutdown
Discard Offending Traffic Yes Yes Yes
Sends log and SNMP
message
No Yes Yes
Disable the interface by
putting it in an err-disabled
state, discarding all
No No Yes
Step 5: Configure the violation mode on the port. Actions that shall be taken when a security
violation is detected. Refer to the table below for the actions to be taken.
Switch(config-if)# switchport port-security violation {protect| restrict | shutdown}
NOTE:
When a secure port is in an error-disabled state, you can bring it out of the state by issuing the
command ‘errdisable recovery cause psecure-violation’ at the global configuration mode, or you can
manually reenable it by entering the ‘shutdown’ and ‘no shutdown’ commands.
Step 6: Set the rate limit for bad packets.
Switch(config-if)# switchport port-security limit rate invalid-source-mac
Step 7: Input the identified secure MAC addresses for the interface. You can use this command to limit the
maximum number of secure MAC addresses. If in case, you configure fewer secure MAC addresses than the
maximum, then the remaining MAC addresses are dynamically learned.
Switch(config-if)# switchport port-security mac-address {mac_address}
Step 8: Verify your configuration by the following commands below.
Switch# show port-security address interface FastEthernet 2/1
Switch# show port-security address

More Related Content

DOCX
Switchport port security explained with examples
PPTX
Security Concerns in LANs.pptx
PDF
Cisco Switch How To - Secure a Switch Port
PPT
Cap2 configuring switch
PPTX
SRWE_Module_11.pptx
DOCX
Configuring dynamic switchport security
PPTX
Switch security
PPT
Chapter 14 - Sw Conf
Switchport port security explained with examples
Security Concerns in LANs.pptx
Cisco Switch How To - Secure a Switch Port
Cap2 configuring switch
SRWE_Module_11.pptx
Configuring dynamic switchport security
Switch security
Chapter 14 - Sw Conf

Similar to How to Configure Port-Security on Cisco Switch for Enhanced Network Security .pptx (20)

DOCX
How to configure port security in cisco switch
PPTX
Network Security- port security.pptx
PPT
PDF
6.5.1.2 packet tracer layer 2 security instructor
PPT
Cisco Training CCNA and Routing Switching.ppt
PDF
2.2.4.9 packet tracer configuring switch port security instructions - ig
PPTX
Port Security
PDF
Hướng dẫn cài đặt switch planet layer 3
PDF
CCNA Lab 2-Configuring a Switch Part II
PDF
Securing Switch Access
PPTX
Cisco CCNA Port Security
PPT
Mitigating Layer2 Attacks
PDF
Communication & switching networks lab manual
PPTX
Session 2
PDF
Nat mikrotik
PDF
How can you configure Wireshark to always recognize port 444 as an S.pdf
PPTX
Switching techniques in networking and uses
PPTX
Layer 2 Attacks and Defense Techniques.pptx
PPS
Ccna Imp Guide
PPT
Cisco Security Training on ASA and FMC.ppt.ppt
How to configure port security in cisco switch
Network Security- port security.pptx
6.5.1.2 packet tracer layer 2 security instructor
Cisco Training CCNA and Routing Switching.ppt
2.2.4.9 packet tracer configuring switch port security instructions - ig
Port Security
Hướng dẫn cài đặt switch planet layer 3
CCNA Lab 2-Configuring a Switch Part II
Securing Switch Access
Cisco CCNA Port Security
Mitigating Layer2 Attacks
Communication & switching networks lab manual
Session 2
Nat mikrotik
How can you configure Wireshark to always recognize port 444 as an S.pdf
Switching techniques in networking and uses
Layer 2 Attacks and Defense Techniques.pptx
Ccna Imp Guide
Cisco Security Training on ASA and FMC.ppt.ppt
Ad

More from INFitunes (9)

PPT
ppt cisco exam-001.ppt
PPTX
info grapic template.pptx
PPTX
IP Subnetting for IPv4.pptx
PPTX
Disadvantage Of SSD and limitations
PPTX
Spanning Tree Protocol and Examples
PPTX
VLAN, VTP, DTP, Ether channel Cheat Sheet With examples.pptx
PPTX
Computer mamory units
PPTX
Basic interview question for Ether Channel.
PPSX
The osi model layers
ppt cisco exam-001.ppt
info grapic template.pptx
IP Subnetting for IPv4.pptx
Disadvantage Of SSD and limitations
Spanning Tree Protocol and Examples
VLAN, VTP, DTP, Ether channel Cheat Sheet With examples.pptx
Computer mamory units
Basic interview question for Ether Channel.
The osi model layers
Ad

Recently uploaded (20)

PDF
Enhancing emotion recognition model for a student engagement use case through...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
August Patch Tuesday
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Getting Started with Data Integration: FME Form 101
PPTX
TLE Review Electricity (Electricity).pptx
PDF
project resource management chapter-09.pdf
PDF
Architecture types and enterprise applications.pdf
PPTX
The various Industrial Revolutions .pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
Enhancing emotion recognition model for a student engagement use case through...
Module 1.ppt Iot fundamentals and Architecture
Univ-Connecticut-ChatGPT-Presentaion.pdf
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
observCloud-Native Containerability and monitoring.pptx
Hindi spoken digit analysis for native and non-native speakers
August Patch Tuesday
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Zenith AI: Advanced Artificial Intelligence
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
OMC Textile Division Presentation 2021.pptx
Getting Started with Data Integration: FME Form 101
TLE Review Electricity (Electricity).pptx
project resource management chapter-09.pdf
Architecture types and enterprise applications.pdf
The various Industrial Revolutions .pptx
DP Operators-handbook-extract for the Mautical Institute
1 - Historical Antecedents, Social Consideration.pdf
NewMind AI Weekly Chronicles – August ’25 Week III

How to Configure Port-Security on Cisco Switch for Enhanced Network Security .pptx

  • 1. 192.168.20.0/30 .1 .2 Restrict Switch Port Security Shutdown | Restrict | Protect
  • 2. Switchport security-part-01 Violation: shutdown Step 1: Enter interface configuration mode and input the physical interface to configure. We will be using FastEthernet 0/2 as an example. Switch(config)# interface FastEthernet 0/2 Step 2: Set the interface mode to access. The default mode, which is dynamic desirable, cannot be configured to be a secured port. Switch(config-if)# switchport mode access Step 3: Enable port security on the interface. Switch(config-if)# switchport port-security Step 4: Set the maximum number of secure MAC addresses for the interface, which ranges from 1 to 3072, wherein the default value is 1. Switch(config-if)# switchport port-security maximum {1-3072}
  • 3. Switch port Action During the Port security Violation Protect Restrict Shutdown Discard Offending Traffic Yes Yes Yes Sends log and SNMP message No Yes Yes Disable the interface by putting it in an err-disabled state, discarding all No No Yes Step 5: Configure the violation mode on the port. Actions that shall be taken when a security violation is detected. Refer to the table below for the actions to be taken. Switch(config-if)# switchport port-security violation {protect| restrict | shutdown} NOTE: When a secure port is in an error-disabled state, you can bring it out of the state by issuing the command ‘errdisable recovery cause psecure-violation’ at the global configuration mode, or you can manually reenable it by entering the ‘shutdown’ and ‘no shutdown’ commands.
  • 4. Step 6: Set the rate limit for bad packets. Switch(config-if)# switchport port-security limit rate invalid-source-mac Step 7: Input the identified secure MAC addresses for the interface. You can use this command to limit the maximum number of secure MAC addresses. If in case, you configure fewer secure MAC addresses than the maximum, then the remaining MAC addresses are dynamically learned. Switch(config-if)# switchport port-security mac-address {mac_address} Step 8: Verify your configuration by the following commands below. Switch# show port-security address interface FastEthernet 2/1 Switch# show port-security address