SlideShare a Scribd company logo
GROUP
MEMBERS
USMAN
IMRAN/16237
ADNAN
SAFDAR/17539
Port Security in Switching
• Device that forwards data from input/output ports towards it’s
destination .
• network hubs, home routers and network bridges are called
switches .
• It donot need to be configured.
• Plug and pay devices.
• Nodes connected through links and differenciated by mac
addresses
• Maintain forwarding table that contain link number and mac
addresses.
• Clear table when switch is off.
Switch
Switch
Ports
• Location on switch where devices are connected.
• Devices maybe computers , printers , games etc.
• Number of ports vary to devices.
• rectangular openings a bit bigger than phone cord.
• have a single port called an uplink or (WAN) port, but the rest
are switch ports
• switch port allows connected devices to talk to each other in
parallel
Switch port Security
• Feature in switches to secure nework
• Limit the number of devices on switch ports
• Uses mac addresses for limitations
Types of port security
• Port Security With Dynamic Mac Addresses
• Port Security With Static Mac Addresses
• Port Security With Sticky Mac Addresses
Port Security With Dynamic Mac
Addresses
• Dynamically configure secure mac addresses of devices
connected to port.
• Addresses will be stored in address table.
• Doesn’t forward traffic of unspecified devices
• Addresses will be lost when the switchport goes down or
switch reboots.
Port Security With Static Mac
Addresses
• Secure MAC addresses are statically configured on each
switchport.
• Stored in the address table.
• Static configuration is stored by default in port Security.
• Addresses table can be made permanent by saving them to
the startup configuration.
Port Security with Sticky MAC
Addresses
• Sticky secure MAC addresses are a hybrid
• Dynamically learned from the devices connected to the
switchport
• Addresses are put into the address table AND are entered into
the running configuration as a static secure MAC address
• MAC addresses will be lost until and unless saved to the
startup configuration
violation
• Violation happens when a person breaks a law or do some
thing that isn’t allowed.
TYPES
• Shutdown
• Protect
• Restrict
Shutdown
• Default switch port security mode
• Port will be taken out of service
• errDisable mode will be activated
• Manually removed from the state
Protect
• switchport will permit traffic from known MAC addresses
• Drop traffic of unknown mac.
• No notification msgs for violation
Restrict
• the switchport will permit traffic from known MAC addresses
• drop traffic of unknown MAC addresses.
• Send notification msgs of violation occured.
Causes of a Switchport Violation
Two situation that causes Switch Port Violation
• Whe maximum number of secure MAC addresses has added in
address table and traffic from unknown MAC address is
received on the switchport.
• When an address that has been seen on a secure switchport
has already been seen on another secure switchport in the
same VLAN.

More Related Content

What's hot

Nat pat
Nat patNat pat
Common Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & MitigationCommon Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & Mitigation
NetProtocol Xpert
 
What is Firewall?
What is Firewall?What is Firewall?
What is Firewall?
NetProtocol Xpert
 
Pgp
PgpPgp
Static Routing
Static RoutingStatic Routing
Static Routing
Kishore Kumar
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
koolkampus
 
Sockets
SocketsSockets
Network attacks
Network attacksNetwork attacks
Network attacks
Manjushree Mashal
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
NCS Computech Ltd.
 
Ethernet
EthernetEthernet
Firewalls
FirewallsFirewalls
Firewalls
Ram Dutt Shukla
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
Varinder Singh Walia
 
Subnetting made simple
Subnetting made simpleSubnetting made simple
Subnetting made simple
Wamuyu Murakaru
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
Switchport port security explained with examples
Switchport port security explained with examplesSwitchport port security explained with examples
Switchport port security explained with examples
teameassefa
 
Multicasting and multicast routing protocols
Multicasting and multicast routing protocolsMulticasting and multicast routing protocols
Multicasting and multicast routing protocols
Abhishek Kesharwani
 
CCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security ConfigurationCCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security Configuration
Mukesh Chinta
 
Basic ip traffic management with access control lists
Basic ip traffic management with access control listsBasic ip traffic management with access control lists
Basic ip traffic management with access control lists
Sourabh Badve
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
Sam Bowne
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
techbed
 

What's hot (20)

Nat pat
Nat patNat pat
Nat pat
 
Common Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & MitigationCommon Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & Mitigation
 
What is Firewall?
What is Firewall?What is Firewall?
What is Firewall?
 
Pgp
PgpPgp
Pgp
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Sockets
SocketsSockets
Sockets
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Ethernet
EthernetEthernet
Ethernet
 
Firewalls
FirewallsFirewalls
Firewalls
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
Subnetting made simple
Subnetting made simpleSubnetting made simple
Subnetting made simple
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Switchport port security explained with examples
Switchport port security explained with examplesSwitchport port security explained with examples
Switchport port security explained with examples
 
Multicasting and multicast routing protocols
Multicasting and multicast routing protocolsMulticasting and multicast routing protocols
Multicasting and multicast routing protocols
 
CCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security ConfigurationCCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security Configuration
 
Basic ip traffic management with access control lists
Basic ip traffic management with access control listsBasic ip traffic management with access control lists
Basic ip traffic management with access control lists
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
 

Viewers also liked

Port security
Port securityPort security
Port security
borepatch
 
Cisco Switch Security
Cisco Switch SecurityCisco Switch Security
Cisco Switch Security
dkaya
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
Ismail Mukiibi
 
Cisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening GuideCisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening Guide
Harris Andrea
 
Switching
SwitchingSwitching
Switching
sheekha_11
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
tameemyousaf
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Medium Access Control
Medium Access ControlMedium Access Control
Medium Access Control
anishgoel
 

Viewers also liked (8)

Port security
Port securityPort security
Port security
 
Cisco Switch Security
Cisco Switch SecurityCisco Switch Security
Cisco Switch Security
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
 
Cisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening GuideCisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening Guide
 
Switching
SwitchingSwitching
Switching
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Medium Access Control
Medium Access ControlMedium Access Control
Medium Access Control
 

Similar to Switching and Port Security

Attack.pptx
Attack.pptxAttack.pptx
Attack.pptx
ISMT College
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
Abdelkhalik Mosa
 
Switched networks (LAN Switching – Switches)
Switched networks (LAN Switching – Switches)Switched networks (LAN Switching – Switches)
Switched networks (LAN Switching – Switches)
Fleurati
 
Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)
Geethu Jose
 
Network Programming Assignment Help
Network Programming Assignment HelpNetwork Programming Assignment Help
Network Programming Assignment Help
HelpWithAssignment.com
 
CCNA- part 8 switch
CCNA- part 8 switchCCNA- part 8 switch
ccna-day4-switching_1234567890123456.pdf
ccna-day4-switching_1234567890123456.pdfccna-day4-switching_1234567890123456.pdf
ccna-day4-switching_1234567890123456.pdf
cisco49
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
zameer Abbas
 
Ch2 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wirelessCh2 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wireless
kratos2424
 
UART SPI and I2C serial Interfaces .pptx
UART SPI and I2C serial Interfaces .pptxUART SPI and I2C serial Interfaces .pptx
UART SPI and I2C serial Interfaces .pptx
rohinitalekar1
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
danishrafiq
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
Ccna day4Ccna day4
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
Reetesh Gupta
 
Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01
Sachin Morya
 
Embedded networking
Embedded networkingEmbedded networking
Embedded networking
Arul Kumar
 
L3-L4 Data Transfer - 8085.pptx
L3-L4 Data Transfer - 8085.pptxL3-L4 Data Transfer - 8085.pptx
L3-L4 Data Transfer - 8085.pptx
Motaleb Hossen Manik
 
Computer Interfaces
Computer Interfaces Computer Interfaces
Computer Interfaces
Prasad Deshpande
 
UNIT 2.pptx
UNIT 2.pptxUNIT 2.pptx
UNIT 2.pptx
BASKARS53
 
Microcontroller.pptx
Microcontroller.pptxMicrocontroller.pptx
Microcontroller.pptx
Saba651353
 

Similar to Switching and Port Security (20)

Attack.pptx
Attack.pptxAttack.pptx
Attack.pptx
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
 
Switched networks (LAN Switching – Switches)
Switched networks (LAN Switching – Switches)Switched networks (LAN Switching – Switches)
Switched networks (LAN Switching – Switches)
 
Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)
 
Network Programming Assignment Help
Network Programming Assignment HelpNetwork Programming Assignment Help
Network Programming Assignment Help
 
CCNA- part 8 switch
CCNA- part 8 switchCCNA- part 8 switch
CCNA- part 8 switch
 
ccna-day4-switching_1234567890123456.pdf
ccna-day4-switching_1234567890123456.pdfccna-day4-switching_1234567890123456.pdf
ccna-day4-switching_1234567890123456.pdf
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
 
Ch2 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wirelessCh2 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wireless
 
UART SPI and I2C serial Interfaces .pptx
UART SPI and I2C serial Interfaces .pptxUART SPI and I2C serial Interfaces .pptx
UART SPI and I2C serial Interfaces .pptx
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01
 
Embedded networking
Embedded networkingEmbedded networking
Embedded networking
 
L3-L4 Data Transfer - 8085.pptx
L3-L4 Data Transfer - 8085.pptxL3-L4 Data Transfer - 8085.pptx
L3-L4 Data Transfer - 8085.pptx
 
Computer Interfaces
Computer Interfaces Computer Interfaces
Computer Interfaces
 
UNIT 2.pptx
UNIT 2.pptxUNIT 2.pptx
UNIT 2.pptx
 
Microcontroller.pptx
Microcontroller.pptxMicrocontroller.pptx
Microcontroller.pptx
 

More from usman19

: Configuration of Kernel Virtual Machine (KVM) for Monitoring Software Defi...
: Configuration of Kernel Virtual  Machine (KVM) for Monitoring Software Defi...: Configuration of Kernel Virtual  Machine (KVM) for Monitoring Software Defi...
: Configuration of Kernel Virtual Machine (KVM) for Monitoring Software Defi...
usman19
 
And the mountains echoed
And the mountains echoedAnd the mountains echoed
And the mountains echoed
usman19
 
Usman
UsmanUsman
Usman
usman19
 
probability in telecom switching
probability in telecom switchingprobability in telecom switching
probability in telecom switching
usman19
 
Sociology-Challenge of Family Institution
Sociology-Challenge of Family InstitutionSociology-Challenge of Family Institution
Sociology-Challenge of Family Institution
usman19
 
transport layer
transport layer transport layer
transport layer
usman19
 
Child abuse
Child abuseChild abuse
Child abuse
usman19
 

More from usman19 (7)

: Configuration of Kernel Virtual Machine (KVM) for Monitoring Software Defi...
: Configuration of Kernel Virtual  Machine (KVM) for Monitoring Software Defi...: Configuration of Kernel Virtual  Machine (KVM) for Monitoring Software Defi...
: Configuration of Kernel Virtual Machine (KVM) for Monitoring Software Defi...
 
And the mountains echoed
And the mountains echoedAnd the mountains echoed
And the mountains echoed
 
Usman
UsmanUsman
Usman
 
probability in telecom switching
probability in telecom switchingprobability in telecom switching
probability in telecom switching
 
Sociology-Challenge of Family Institution
Sociology-Challenge of Family InstitutionSociology-Challenge of Family Institution
Sociology-Challenge of Family Institution
 
transport layer
transport layer transport layer
transport layer
 
Child abuse
Child abuseChild abuse
Child abuse
 

Recently uploaded

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 

Recently uploaded (20)

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 

Switching and Port Security

  • 1.
  • 3. Port Security in Switching
  • 4. • Device that forwards data from input/output ports towards it’s destination . • network hubs, home routers and network bridges are called switches . • It donot need to be configured. • Plug and pay devices.
  • 5. • Nodes connected through links and differenciated by mac addresses • Maintain forwarding table that contain link number and mac addresses. • Clear table when switch is off.
  • 8. Ports • Location on switch where devices are connected. • Devices maybe computers , printers , games etc. • Number of ports vary to devices.
  • 9. • rectangular openings a bit bigger than phone cord. • have a single port called an uplink or (WAN) port, but the rest are switch ports • switch port allows connected devices to talk to each other in parallel
  • 10.
  • 11.
  • 12. Switch port Security • Feature in switches to secure nework • Limit the number of devices on switch ports • Uses mac addresses for limitations
  • 13. Types of port security • Port Security With Dynamic Mac Addresses • Port Security With Static Mac Addresses • Port Security With Sticky Mac Addresses
  • 14. Port Security With Dynamic Mac Addresses • Dynamically configure secure mac addresses of devices connected to port. • Addresses will be stored in address table. • Doesn’t forward traffic of unspecified devices • Addresses will be lost when the switchport goes down or switch reboots.
  • 15. Port Security With Static Mac Addresses • Secure MAC addresses are statically configured on each switchport. • Stored in the address table. • Static configuration is stored by default in port Security. • Addresses table can be made permanent by saving them to the startup configuration.
  • 16. Port Security with Sticky MAC Addresses • Sticky secure MAC addresses are a hybrid • Dynamically learned from the devices connected to the switchport • Addresses are put into the address table AND are entered into the running configuration as a static secure MAC address • MAC addresses will be lost until and unless saved to the startup configuration
  • 17. violation • Violation happens when a person breaks a law or do some thing that isn’t allowed. TYPES • Shutdown • Protect • Restrict
  • 18. Shutdown • Default switch port security mode • Port will be taken out of service • errDisable mode will be activated • Manually removed from the state
  • 19. Protect • switchport will permit traffic from known MAC addresses • Drop traffic of unknown mac. • No notification msgs for violation
  • 20. Restrict • the switchport will permit traffic from known MAC addresses • drop traffic of unknown MAC addresses. • Send notification msgs of violation occured.
  • 21. Causes of a Switchport Violation Two situation that causes Switch Port Violation • Whe maximum number of secure MAC addresses has added in address table and traffic from unknown MAC address is received on the switchport. • When an address that has been seen on a secure switchport has already been seen on another secure switchport in the same VLAN.