SlideShare a Scribd company logo
2
Most read
3
Most read
12
Most read
  Switching and Port Security
GROUP
MEMBERS
USMAN
IMRAN/16237
ADNAN
SAFDAR/17539
Port Security in Switching
• Device that forwards data from input/output ports towards it’s
destination .
• network hubs, home routers and network bridges are called
switches .
• It donot need to be configured.
• Plug and pay devices.
• Nodes connected through links and differenciated by mac
addresses
• Maintain forwarding table that contain link number and mac
addresses.
• Clear table when switch is off.
Switch
Switch
Ports
• Location on switch where devices are connected.
• Devices maybe computers , printers , games etc.
• Number of ports vary to devices.
• rectangular openings a bit bigger than phone cord.
• have a single port called an uplink or (WAN) port, but the rest
are switch ports
• switch port allows connected devices to talk to each other in
parallel
  Switching and Port Security
  Switching and Port Security
Switch port Security
• Feature in switches to secure nework
• Limit the number of devices on switch ports
• Uses mac addresses for limitations
Types of port security
• Port Security With Dynamic Mac Addresses
• Port Security With Static Mac Addresses
• Port Security With Sticky Mac Addresses
Port Security With Dynamic Mac
Addresses
• Dynamically configure secure mac addresses of devices
connected to port.
• Addresses will be stored in address table.
• Doesn’t forward traffic of unspecified devices
• Addresses will be lost when the switchport goes down or
switch reboots.
Port Security With Static Mac
Addresses
• Secure MAC addresses are statically configured on each
switchport.
• Stored in the address table.
• Static configuration is stored by default in port Security.
• Addresses table can be made permanent by saving them to
the startup configuration.
Port Security with Sticky MAC
Addresses
• Sticky secure MAC addresses are a hybrid
• Dynamically learned from the devices connected to the
switchport
• Addresses are put into the address table AND are entered into
the running configuration as a static secure MAC address
• MAC addresses will be lost until and unless saved to the
startup configuration
violation
• Violation happens when a person breaks a law or do some
thing that isn’t allowed.
TYPES
• Shutdown
• Protect
• Restrict
Shutdown
• Default switch port security mode
• Port will be taken out of service
• errDisable mode will be activated
• Manually removed from the state
Protect
• switchport will permit traffic from known MAC addresses
• Drop traffic of unknown mac.
• No notification msgs for violation
Restrict
• the switchport will permit traffic from known MAC addresses
• drop traffic of unknown MAC addresses.
• Send notification msgs of violation occured.
Causes of a Switchport Violation
Two situation that causes Switch Port Violation
• Whe maximum number of secure MAC addresses has added in
address table and traffic from unknown MAC address is
received on the switchport.
• When an address that has been seen on a secure switchport
has already been seen on another secure switchport in the
same VLAN.

More Related Content

PPTX
Network Security- port security.pptx
PPTX
Port Security
PPT
network Switch
PPTX
Access Control List (ACL)
PPT
Arp spoofing
PDF
CCNAv5 - S2: Chapter5 Inter Vlan Routing
PDF
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
PDF
Inter VLAN Routing
Network Security- port security.pptx
Port Security
network Switch
Access Control List (ACL)
Arp spoofing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
Inter VLAN Routing

What's hot (20)

PPT
Switch configuration
PPTX
Spanning tree protocol
PPTX
PPT
PDF
CSMA /CD PPT ON SLIDESHARE
PPTX
PPTX
The medium access sublayer
PPTX
Ethernet - LAN
PPT
PDF
Overview of Spanning Tree Protocol
PPT
Lan technologies
PPTX
Network Security
PPTX
Firewall ( Cyber Security)
PDF
Lecture 19 22. transport protocol for ad-hoc
PPT
CCNA PPT
PPT
PPTX
Media Access Control
PPTX
Switches on Networking
PPT
Ch07 Access Control Fundamentals
PPTX
Transmission impairments(presentation)
Switch configuration
Spanning tree protocol
CSMA /CD PPT ON SLIDESHARE
The medium access sublayer
Ethernet - LAN
Overview of Spanning Tree Protocol
Lan technologies
Network Security
Firewall ( Cyber Security)
Lecture 19 22. transport protocol for ad-hoc
CCNA PPT
Media Access Control
Switches on Networking
Ch07 Access Control Fundamentals
Transmission impairments(presentation)
Ad

Viewers also liked (8)

PPT
Port security
PPT
Cisco Switch Security
PPTX
Mac addresses(media access control)
PDF
Cisco Router and Switch Security Hardening Guide
PPTX
Switching
PPT
Switching Techniques
PPTX
Computer network switching
PPTX
Medium Access Control
Port security
Cisco Switch Security
Mac addresses(media access control)
Cisco Router and Switch Security Hardening Guide
Switching
Switching Techniques
Computer network switching
Medium Access Control
Ad

Similar to Switching and Port Security (20)

PPT
Cap2 configuring switch
PPTX
Switch security
PPTX
Security Concerns in LANs.pptx
DOCX
Switchport port security explained with examples
PDF
Cisco Switch How To - Secure a Switch Port
PPT
Cisco Training CCNA and Routing Switching.ppt
PDF
Vlan
PPTX
Layer 2 switching
DOCX
Configuring dynamic switchport security
PPTX
SRWE_Module_11.pptx
PDF
tep 2 Display the switch MAC address .pdf
PDF
Increasing network efficiency by preventing attacks at access layer
PPTX
Attack.pptx
PDF
CCNP_qefwqqw3fqwfq2wrffqwf2qwfwqwfS1.pdf
PDF
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
PDF
A Presentation About Network Switches.pdf
PDF
Wp ci securing_layer2
PPTX
PPT
Mitigating Layer2 Attacks
DOCX
Cisco ios order of operation
Cap2 configuring switch
Switch security
Security Concerns in LANs.pptx
Switchport port security explained with examples
Cisco Switch How To - Secure a Switch Port
Cisco Training CCNA and Routing Switching.ppt
Vlan
Layer 2 switching
Configuring dynamic switchport security
SRWE_Module_11.pptx
tep 2 Display the switch MAC address .pdf
Increasing network efficiency by preventing attacks at access layer
Attack.pptx
CCNP_qefwqqw3fqwfq2wrffqwf2qwfwqwfS1.pdf
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
A Presentation About Network Switches.pdf
Wp ci securing_layer2
Mitigating Layer2 Attacks
Cisco ios order of operation

More from usman19 (7)

PDF
: Configuration of Kernel Virtual Machine (KVM) for Monitoring Software Defi...
PPTX
And the mountains echoed
PPTX
Usman
PPTX
probability in telecom switching
PPTX
Sociology-Challenge of Family Institution
PPTX
transport layer
PPTX
Child abuse
: Configuration of Kernel Virtual Machine (KVM) for Monitoring Software Defi...
And the mountains echoed
Usman
probability in telecom switching
Sociology-Challenge of Family Institution
transport layer
Child abuse

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPT
Teaching material agriculture food technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
cuic standard and advanced reporting.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Approach and Philosophy of On baking technology
PPTX
Big Data Technologies - Introduction.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
NewMind AI Weekly Chronicles - August'25 Week I
Unlocking AI with Model Context Protocol (MCP)
Programs and apps: productivity, graphics, security and other tools
Dropbox Q2 2025 Financial Results & Investor Presentation
Teaching material agriculture food technology
Encapsulation_ Review paper, used for researhc scholars
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Review of recent advances in non-invasive hemoglobin estimation
MIND Revenue Release Quarter 2 2025 Press Release
cuic standard and advanced reporting.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Approach and Philosophy of On baking technology
Big Data Technologies - Introduction.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Diabetes mellitus diagnosis method based random forest with bat algorithm
“AI and Expert System Decision Support & Business Intelligence Systems”
NewMind AI Weekly Chronicles - August'25 Week I

Switching and Port Security

  • 3. Port Security in Switching
  • 4. • Device that forwards data from input/output ports towards it’s destination . • network hubs, home routers and network bridges are called switches . • It donot need to be configured. • Plug and pay devices.
  • 5. • Nodes connected through links and differenciated by mac addresses • Maintain forwarding table that contain link number and mac addresses. • Clear table when switch is off.
  • 8. Ports • Location on switch where devices are connected. • Devices maybe computers , printers , games etc. • Number of ports vary to devices.
  • 9. • rectangular openings a bit bigger than phone cord. • have a single port called an uplink or (WAN) port, but the rest are switch ports • switch port allows connected devices to talk to each other in parallel
  • 12. Switch port Security • Feature in switches to secure nework • Limit the number of devices on switch ports • Uses mac addresses for limitations
  • 13. Types of port security • Port Security With Dynamic Mac Addresses • Port Security With Static Mac Addresses • Port Security With Sticky Mac Addresses
  • 14. Port Security With Dynamic Mac Addresses • Dynamically configure secure mac addresses of devices connected to port. • Addresses will be stored in address table. • Doesn’t forward traffic of unspecified devices • Addresses will be lost when the switchport goes down or switch reboots.
  • 15. Port Security With Static Mac Addresses • Secure MAC addresses are statically configured on each switchport. • Stored in the address table. • Static configuration is stored by default in port Security. • Addresses table can be made permanent by saving them to the startup configuration.
  • 16. Port Security with Sticky MAC Addresses • Sticky secure MAC addresses are a hybrid • Dynamically learned from the devices connected to the switchport • Addresses are put into the address table AND are entered into the running configuration as a static secure MAC address • MAC addresses will be lost until and unless saved to the startup configuration
  • 17. violation • Violation happens when a person breaks a law or do some thing that isn’t allowed. TYPES • Shutdown • Protect • Restrict
  • 18. Shutdown • Default switch port security mode • Port will be taken out of service • errDisable mode will be activated • Manually removed from the state
  • 19. Protect • switchport will permit traffic from known MAC addresses • Drop traffic of unknown mac. • No notification msgs for violation
  • 20. Restrict • the switchport will permit traffic from known MAC addresses • drop traffic of unknown MAC addresses. • Send notification msgs of violation occured.
  • 21. Causes of a Switchport Violation Two situation that causes Switch Port Violation • Whe maximum number of secure MAC addresses has added in address table and traffic from unknown MAC address is received on the switchport. • When an address that has been seen on a secure switchport has already been seen on another secure switchport in the same VLAN.