• If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.
Xin chào ! Nếu đây là lần đầu tiên bạn đến với diễn đàn, xin vui lòng danh ra một phút bấm vào đây để đăng kí và tham gia thảo luận cùng VnPro.

Announcement

Collapse
No announcement yet.

Port Security Lab Sim

Collapse
This is a sticky topic.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Port Security Lab Sim

    Question
    You are the network security administrator for Big Money Bank Co. You are informed that an attacker has performed a CAM table overflow attack by sending spoofed MAC addresses on one of the switch ports. The attacker has since been identified and escorted out of the campus. You now need to take action to configure the switch port to protect against this kind of attack in the future.
    For purposes of this test, the attacker was connected via a hub to the Fa0/12 interface of the switch. The topology is provided for your use. The enable password of the switch is cisco. Your task is to configure the Fa0/12 interface on the switch to limit the maximum number of MAC addresses that are allowed to access the port to two and to shutdown the interface when there is a violation.
    Answer and Explanation


    The purpose of this sim is straightforward:
    • Limit the maximum number of MAC addresses that are allowed to access the port to two.
    • Shutdown the interface when there is a violation.

    Please remember that we have to access interface Fa0/12 to fulfill the requirements. Before making any configuration, we should use the show running-config to check the status of interface Fa0/12
    Switch>enable
    Password: cisco
    Switch#show running-config
    The interface Fa0/12 hasn’t been configured with anything.
    Switch#configure terminal
    Switch(config)#interface fa0/12
    Switch(config-if)#switchport mode access

    First, enable the “port security” feature on this interface:
    Switch(config-if)#switchport port-security
    Set the maximum number of secure MAC addresses for this interface to 2:
    Switch(config-if)#switchport port-security maximum 2
    Shutdown if the security is violated:
    Switch(config-if)#switchport port-security violation shutdown
    Switch(config-if)#no shutdown
    Switch(config-if)#end
    Now you should check if the configuration is correct or not by typing the command show port-security interface fa0/12
    Switch#show port-security interface fa0/12
    Notice that the parameters should be like this:
    + Port Security: Enabled
    + Violation Mode: Shutdown
    + Maximum MAC Address: 2
    Save the configuration
    Switch#copy running-config startup-config
    Just for your information, when the security is violated the port is in the error-disabled state. We can bring it out of this state by entering the “errdisable recovery cause psecure-violation” global configuration command or we can manually re-enable it by entering the “shutdown” and “no shutdown” commands in the interface configuration.
    Phạm Minh Tuấn

    Email : phamminhtuan@vnpro.org
    Yahoo : phamminhtuan_vnpro
    -----------------------------------------------------------------------------------------------
Trung Tâm Tin Học VnPro
149/1D Ung Văn Khiêm P25 Q.Bình thạnh TPHCM
Tel : (08) 35124257 (5 lines)
Fax: (08) 35124314

Home page: http://www.vnpro.vn
Support Forum: http://www.vnpro.org
- Chuyên đào tạo quản trị mạng và hạ tầng Internet
- Phát hành sách chuyên môn
- Tư vấn và tuyển dụng nhân sự IT
- Tư vấn thiết kế và hỗ trợ kỹ thuật hệ thống mạng

Network channel: http://www.dancisco.com
Blog: http://www.vnpro.org/blog
Working...
X