SlideShare a Scribd company logo
1 of 12
TK3183-Teknologi Switching LAN
Keamanan pada Switch
Prajna Deshanta Ibnugraha, ST. MT. CCENT. CCNA
Email : prj@politekniktelkom.ac.id
Hanya dipergunakan untuk kepentingan pengajaran di lingkungan politeknik
Telkom
Tahun Ajaran 2013/2014
Semester Gasal
Switch Security Attack
 MAC Address Flooding
 Spoofing Attack
 CDP Attack
 Telnet Attack : Brute Force, DoS Attack
Spoofing Attack
CDP Attack
Security Check
 Network Security Audit
 Network Penetration Testing
Metode Pengamanan Switch
 Fitur keamanan Switch Manageable yang dapat
dimanfaatkan adalah
Port Security
Chase Topology
Chase 1
 Konfigurasi :
Switch(config)# interface fastethernet 0/2
Switch(config-if)# switchport mode access
Switch(config-if)# switchport port-security
Switch(config-if)# switchport port-security mac-
address [mac-PC]
 Gantilah PC yang memiliki MAC address yang
berbeda
 Analisa hasilnya : kesimpulan???
Chase 2
 Konfigurasi :
Switch(config)# interface fastethernet 0/2
Switch(config-if)# switchport mode access
Switch(config-if)# switchport port-security
Switch(config-if)# switchport port-security maximum 2
Switch(config-if)# switchport port-security mac-
address sticky
Switch(config-if)# end
 Gantilah PC yang memiliki MAC address berbeda-beda
sebanyak 3 kali
 Analisa hasilnya
Chase 3
 Konfigurasi :
Switch(config)# interface fastethernet 0/2
Switch(config-if)# switchport mode access
Switch(config-if)# switchport port-security
Switch(config-if)# switchport port-security mac-
address [mac-PC]
Switch(config-if)# switchport port-security
violation restrict
 Gantilah PC yang memiliki MAC address yang
berbeda
 Analisa hasilnya : kesimpulan???
Chase 4
 Konfigurasi :
Switch(config)# interface fastethernet 0/2
Switch(config-if)# switchport mode access
Switch(config-if)# switchport port-security
Switch(config-if)# switchport port-security maximum 2
Switch(config-if)# switchport port-security mac-
address sticky
Switch(config-if)# switchport port-security violation
restrict
 Gantilah PC yang memiliki MAC address berbeda-beda
sebanyak 3 kali
 Analisa hasilnya
Daftar Pustaka
 CCNA Exploration versi 4. CCNA Exploration: LAN
Switching and Wireless. Cisco
 Lammle, Todd. (2011). CCNA Cisco Certified
Network Associate Study Guide, 7th Edition. SYBEX.
 Odom, Wendell. (2011). CCNA 640-802 Official Cert
Library, Updated (3rd Edition). Cisco Press

More Related Content

Featured

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 

Featured (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

04 tk3183-keamanan pada-switch

  • 1. TK3183-Teknologi Switching LAN Keamanan pada Switch Prajna Deshanta Ibnugraha, ST. MT. CCENT. CCNA Email : prj@politekniktelkom.ac.id Hanya dipergunakan untuk kepentingan pengajaran di lingkungan politeknik Telkom Tahun Ajaran 2013/2014 Semester Gasal
  • 2. Switch Security Attack  MAC Address Flooding  Spoofing Attack  CDP Attack  Telnet Attack : Brute Force, DoS Attack
  • 5. Security Check  Network Security Audit  Network Penetration Testing
  • 6. Metode Pengamanan Switch  Fitur keamanan Switch Manageable yang dapat dimanfaatkan adalah Port Security
  • 8. Chase 1  Konfigurasi : Switch(config)# interface fastethernet 0/2 Switch(config-if)# switchport mode access Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security mac- address [mac-PC]  Gantilah PC yang memiliki MAC address yang berbeda  Analisa hasilnya : kesimpulan???
  • 9. Chase 2  Konfigurasi : Switch(config)# interface fastethernet 0/2 Switch(config-if)# switchport mode access Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security maximum 2 Switch(config-if)# switchport port-security mac- address sticky Switch(config-if)# end  Gantilah PC yang memiliki MAC address berbeda-beda sebanyak 3 kali  Analisa hasilnya
  • 10. Chase 3  Konfigurasi : Switch(config)# interface fastethernet 0/2 Switch(config-if)# switchport mode access Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security mac- address [mac-PC] Switch(config-if)# switchport port-security violation restrict  Gantilah PC yang memiliki MAC address yang berbeda  Analisa hasilnya : kesimpulan???
  • 11. Chase 4  Konfigurasi : Switch(config)# interface fastethernet 0/2 Switch(config-if)# switchport mode access Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security maximum 2 Switch(config-if)# switchport port-security mac- address sticky Switch(config-if)# switchport port-security violation restrict  Gantilah PC yang memiliki MAC address berbeda-beda sebanyak 3 kali  Analisa hasilnya
  • 12. Daftar Pustaka  CCNA Exploration versi 4. CCNA Exploration: LAN Switching and Wireless. Cisco  Lammle, Todd. (2011). CCNA Cisco Certified Network Associate Study Guide, 7th Edition. SYBEX.  Odom, Wendell. (2011). CCNA 640-802 Official Cert Library, Updated (3rd Edition). Cisco Press

Editor's Notes

  1. Switch memiliki tempat penyimpanan MAC Address yang terbatas, contoh Switch Catalyst seri 2960 hanya dapatr menyimpan 8192 MAC Address. Untuk melihat MAC Address table dapat menggunakan perintah #show mac-address-table DoS Attack  bertujuan agar admin tidak dapat melakukan management ke switch lewat telnet
  2. Rogue DHCP Attacker menyamar sebagai Legitimate DHCP Server dengan memberikan informasi palsu kepada client seperti IP Gateway, DNS Server, dll
  3. CDP Attack dapat dilakukan dengan sniffing, karena CDP secara default di broadcast. Informasi yang didapat dari protokol CDP biasanya berupa spesifikasi perangkat, seperti versi IOS , dll
  4. Network Security Audit  melakukan pemeriksaan terhadap sistem dan jaringan berdasarkan SOP Network Penetration Testing  melakukan percobaan penetrasi terhadap jaringan atau sistem dengan tujuan mengetahui kelemahan untuk dilaporkan kepada yg pemilik sistem.
  5. Port Security adalah fitur dari switch manageable untuk membatasi akses user device, biasanya berdasarkan MAC Address
  6. Dibuat dengan packet tracer
  7. Answer : Port akan shutdown untuk selain MAC Address yang telah dimasukkan
  8. Answer : Port akan restrict/blok (bukan shutdown) untuk setelah MAC Address ke 3 Sticky  mampu belajar terhadap inputan baru