Solved

Cisco switchport port-security

Posted on 2014-09-09
4
326 Views
Last Modified: 2014-09-11
For the catalyst switch, what do the following commands do?

int fa0/3

...

switchport port-security

switchport port-security violation restrict

...

spannig-tree bpduguard enable

spanning-tree portfast

Thanks
0
Comment
Question by:leblanc
  • 3
4 Comments
 
LVL 12

Accepted Solution

by:
Bryant Schaper earned 500 total points
ID: 40312586
switchport port-security - mac security at the port, only mac listed have access
switchport port-security violation restrict - one of the violiation methods of port-security, restrict is an admin notification in the log
spannig-tree bpduguard enable - BPDU Guard is designed to protect your switching network. Remember that a Port-fast port is designed to be connected to a device where BPDU’s aren’t expected. This could be a end user device, server or access-point.  When an unexpected BPDU is detected (an end-user wants to plug in a switch in his cubicle) the port will shutdown and enter a err-disable state.
spanning-tree portfast - for access ports, Portfast minimizes the time it takes for the server or workstation to come online
0
 
LVL 1

Author Comment

by:leblanc
ID: 40312594
If my fa0/3 is a trunk, do I need those commands there?
0
 
LVL 12

Assisted Solution

by:Bryant Schaper
Bryant Schaper earned 500 total points
ID: 40312607
I would not use any of those commands, actually they will cause more problems, loopbacks, and also the security could shutdown the port.  I would only use them on access ports.
0
 
LVL 12

Assisted Solution

by:Bryant Schaper
Bryant Schaper earned 500 total points
ID: 40312609
Spanning tree portfast would cause a loopback

bpduguard would shutdown the port if it senses another switch via bpdu packets
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question