Port Security

Switches are susceptible to a variety of attacks, including:

  • MAC address flooding: In this kind of assault, a node is typically used to allow access to a switch. After that, they employ a device to communicate false source MAC addresses to the switch. The MAC address is added to the mac-address-table, which can only store a set amount of MAC addresses, to enable switch operation. The switch starts acting like a hub by flooding frames out of the ports when this database is full, making it impossible for it to forward traffic using unicast. This indicates that every frame for every node in the network is visible to the attacker.
  • MAC-address spoofing: In this attack, a hacker pretends to be a DHCP server and replies with an address that enables them to view traffic from a specific node while legitimate clients ask for addresses from the server.
  • Other frequent assaults might target CDP, telnet, or other technical flaws that can be exploited by the switch.

One method for defending the switch against such attacks is by using port security. Before the switch is implemented, all ports or interfaces should be secured. The number of valid MAC addresses that can use a port is constrained by port security.

One method of protecting a Cisco switch is port security. The following methods that configuration choices employing port security can secure the switch.

  1. Utilizing statically configured MAC addresses requires hardcoding a specific user node’s MAC address onto each port on a switch to designate that port to a certain user node. This indicates that only equipment with MAC addresses that match those configured can interact. This is a fantastic technique to establish security, however, given the size of the network, configuring the MAC addresses of the clients to the switch may be an administrative nightmare.
  2. A good technique to assure security on a switch is to use dynamic secure MAC addresses. The MAC addresses of the user nodes are specified to be learned and stored by the switch ports.
  3. Sticky MAC addresses can be used to make sure that only MAC addresses that have been dynamically learned can use the switch. Since these addresses are saved to the switch’s running configuration file, they are lost when rebooted.
  4. The maximum number of MAC addresses that can use a specific port can also be specified. This is a reliable method of preventing MAC address spoofing.


Switch Concepts and Configuration

A switch is a discrete piece of hardware that connects various computers to a single local area network (LAN). In the OSI model, network switches function at layer 2 (Data link layer).

  • On the basis of MAC addresses, switches are utilized to forward the packets.
  • The switch makes it possible for the device that has been addressed to receive the data.  
  •  It checks the destination address before properly routing the packet.
  • Full duplex operation is used.
  • Since the source and destination are communicating directly, packet collision is minimal.
  • It does not broadcast the message since its bandwidth is constrained.

Similar Reads

Switching

Messages are sent over the network of transmission media when a person uses the internet or another computer network from a location other than their immediate area. Switching is the term used to describe this method of moving data between computer networks....

Ethernet

Devices connected to the same Ethernet segment typically use this sort of communication on LAN networks to listen to the network media to determine whether they can transmit or whether they need to wait. Switches allow several devices to access the media simultaneously while hubs only allow one device to broadcast at once. There are three different methods of message transmission in Ethernet communication: Unicast, Multicast, and Broadcast....

Addressing

Physical addresses, which are frequently MAC addresses, are the type of addressing utilized in Ethernet. The address used to transmit frames is this one. Frames are created when packets are received from the network layer. This entails including details like the source and destination MAC addresses....

MAC Address

The MAC address is the address used in Ethernet which is of 48 bits that make up the address and are represented by hexadecimal numerals. When discussing layer 3 addressing, we stated that an IP address is divided into two segments: the network segment and the host segment. A MAC address is also divided into two parts. OUI (Organizational Unique Identifier)  the number is given to the vendor The first 24 bits of the MAC address make up the OUI. Typically, it is the code that the IEEE has assigned to a specific vendor. For instance, the OUI in Cisco switches is typical: 0009.7C The vendor for that specific device often assigns a number to the next 24 bits. It gives the hardware of the device a distinct identity. The complete MAC address is often permanently hard-coded into the switch’s circuitry....

Operation modes in Ethernet

There are two modes of operation for Ethernet networks; the duplex decides whether the communication is unidirectional or bidirectional. There are two duplex modes: Half Duplex and Full Duplex....

MAC Address Table

The routing decisions routers make are based on the data in the routing table. Similarly, the switches include an address database. The MAC-Address table is a database that serves as the foundation for how to switch forward frames. This database is used by the switch to identify the source and destination of frames when communicating. Following are the actions that are conducted when a switch wants to forward a frame....

Configuring the Switch

The many configuration modes included the interface configuration, the global configuration mode, the privileged executive mode, the user executive mode, and several more specific configuration modes. Here, we will set up some of a switch’s fundamental settings, such as:...

Port Security

Switches are susceptible to a variety of attacks, including:...

Contact Us