Solved

Port based security on Cisco Switches

Posted on 2012-03-29
5
355 Views
Last Modified: 2012-06-27
I need to find out which Cisco switches support port based security. I have a network with Cisco voice and data along with their respective vlans, however I need to create some additional vlans and be able to allow access on ports only to specified MAC addresses so that under no circumstances can anyone connect a device and have access to the network. Can someone please offer suggestions and maybe shed some light on what that config would look like.
0
Comment
Question by:ryanva
5 Comments
 
LVL 5

Expert Comment

by:andrew1812
ID: 37782170
0
 
LVL 10

Expert Comment

by:mat1458
ID: 37782580
Any IOS switch can do that: 2960, 3560, 3750, 4500, 6500. Also the older ones like 2950, 3550, 4000, 6000 do that. And some of the SMB switches support it as well.

Do yu already have any type of switches?
0
 

Author Comment

by:ryanva
ID: 37782605
I have a Cisco 2960-24PC-L for the voice vlan and two Linksys SGE2000P switches for the data vlan
0
 
LVL 10

Accepted Solution

by:
mat1458 earned 500 total points
ID: 37784027
0
 
LVL 17

Expert Comment

by:TimotiSt
ID: 37786705
Config looks like:

 switchport port-security
 switchport port-security violation restrict

with the addition of a "switchport port-security mac-address sticky" statement.

Please be aware that MAC addresses can be cloned, so 802.1x is a better security tool.

Tamas
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question