设为首页收藏本站language 语言切换
查看: 2131|回复: 0
收起左侧

[分享] CCNA LAB 9: 配置 Switch Access Port Security

[复制链接]
 成长值: 63730
发表于 2022-11-10 09:27:30 | 显示全部楼层 |阅读模式
本帖最后由 小乔 于 2022-11-10 09:29 编辑


Lab Objective:
The objective of this lab exercise is to configure basic switch security to prevent MAC address flooding on switchports. This is accomplished by limiting the number of MAC entries that are allowed to be learned on a port. By default, there is no limit on MAC addresses that can be learned on a port.

Lab Purpose:
Port security is a fundamental skill. A common Denial of Service technique used to cripple switched networks is MAC flooding. As a Cisco engineer, as well as in the Cisco CCNA exam, you will be expected to know how to configure port security to mitigate MAC flooding attacks.

Certification Level:
This lab is suitable for CCNA certification exam preparation.

Lab Difficulty:
This lab has a difficulty rating of 8/10.

Readiness Assessment:
When you are ready for your certification exam, you should complete this lab in no more than 15 minutes.

Lab Topology:
Please use the following topology to complete this lab exercise:

9.png


Task 1:
Configure hostnames on Sw1 and R1 as illustrated in the topology.

Task 2:
Create VLAN10 on Sw1 and assign port FastEthernet0/2 to this VLAN as an access port.

Task 3:
Configure IP address 10.0.0.1/30 on R1’s FastEthernet0/0 interface and IP address 10.0.0.2/30 on Sw2’s VLAN10 interface. Verify that R1 can ping Sw1, and vice versa.


Task 4:
Configure port security on port FastEthernet0/2 on Sw1 so that only one MAC address is allowed to be learned on that interface. In the event of port security configuration violations, where more than one MAC address is observed on that interface, the switch should shut the interface down. Verify your configuration with port-security commands in Cisco IOS.

Configuration and Verification
Task 1:
For reference information on configuring hostnames, please refer to earlier labs.

Task 2:
For reference information on configuring VLANs, please refer to earlier labs. The port can’t be dynamic if you intend to add port security. It must be manually set to trunk or access.

Task 3:
For reference information on configuring router IP interfaces, please refer to earlier labs.


Sw1(config)#int vlan10
%LINK-5-CHANGED: Interface Vlan10, changed state to up
Sw1(config-if)#ip add 10.0.0.2 255.255.255.252
Sw1(config-if)#no shut
Sw1(config-if)#end
Sw1#ping 10.0.0.1

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.1, timeout is 2 seconds:
.!!!! Success rate is 80 percent (4/5), round-trip min/avg/max = 0/0/0 ms
Task 4:
Sw1#conf t
Enter configuration commands, one per line.  End with CTRL/Z.
Sw1(config)#interface fastethernet 0/2
Sw1(config-if)#switchport port-security
Sw1(config-if)#switchport port-security maximum 1
Sw1(config-if)#switchport port-security violation shutdown
Sw1(config-if)#end
Sw1#show port-security
Secure Port MaxSecureAddr CurrentAddr SecurityViolation Sec Action
(Count)        (Count)      (Count)
----------------------------------------------------------------------
Fa0/2           1               0             0            Shutdown
----------------------------------------------------------------------
Total Addresses in System : 0
Max Addresses limit in System : 1024


NOTE: If you wanted to test your port security configuration, you could simply change the MAC address of FastEthernet0/0 on R1 to 000a.bc01.2300, and then you would see a port security violation. For example:


R1#conf t
Enter configuration commands, one per line.  End with CTRL/Z.
R1(config)#interface fastethernet0/0
R1(config-if)#mac-address 000a.bc01.2300
R1(config)#end
R1#

Sw1#show port-security
Secure Port MaxSecureAddr CurrentAddr SecurityViolation Sec Action
             (Count)        (Count)      (Count)
----------------------------------------------------------------------
Fa0/2           1               0             1              Shutdown
----------------------------------------------------------------------
Total Addresses in System : 0
Max Addresses limit in System : 1024

Sw1#show interfaces fastethernet 0/2
FastEthernet0/2 is down, line protocol is down (errdisabled)
As can be seen in the output above, the violation counter has incremented and the interface is now in an errdisabled mode, which basically means it has been shut down due to a port security violation. To bring this interface back up, you need to issue a shutdown command and then a no shutdown command under the interface.

来源: CCNA LAB 8: 配置 Securing VTP Domains
您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-2-24 17:57 , Processed in 0.059197 second(s), 23 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表