Switch Security Flashcards

1
Q

DHCP Snooping Configuration

A

ip dhcp snooping
ip dhcp snooping vlan 10

interface f0/1
ip dhcp snooping trust

Must configure ports connected to DHCP server as trusted, otherwise responses are dropped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Command: Configure DAI to trust port F0/1

A

interface f0/1
ip arp inspection trust

Need to configure the switch to trust the ports associated with non-dhcp hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Command: Enable DAI on VLAN 10

A

ip arp inspection vlan 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Port Security Overview

A

Enables an admin to specify which MAC address(es) can send traffic in to an individual switch port

This can be used to lock a port down to a particular hosts or hosts
-It’s easy to spoof a MAC, so this isn’t port security’s main role

Can also configure individual switch ports to allow only a specified number of source MACs to send traffic into the port
-It can learn connected MAC addresses

Prevents users from adding WAPs or other shared devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Port Security Default Behavior

A

If you configure Port Security with no additional parameters then only one MAC is allowed to transmit on the port

The current MAC can be disconnected & replaced
-The port is not locked down to a particular MAC

If a shared device is connected & multiple hosts try to transmit, the port will be shut down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Command: Configure port security on interface F0/2

A

interface f0/2
switchport port-security

Configured at interface level, typically implemented on all interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Command: Verify port security information on interface F0/2

A

show port-security interface f0/2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Port Security: Violation Actions

A

Shutdown (Default)
-Interface is placed into the error-disabled state, blocking all traffic

Protect

  • Traffic from unauthorized addresses is dropped
  • Traffic from allowed addresses is forwarded

Restrict

  • Traffic from unauthorized addresses is dropped, logged, and the violation counter incremented
  • Traffic from allowed addresses is forwarded
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Command: Configure interface F0/2 violation action as restrict

A

interface f0/2

switchport port-security violation restrict

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Command: Configure interface F0/2 violation action as protect

A

interface f0/2

Switchport port-security violation protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Error-Disabled Interfaces

A

If the Violation Action is set to Shutdown & a violation occurs, the port will move to an error-disabled state

To bring an error-disabled interface back into service:

  • Physically remove the host with the offending MAC
  • Manually shutdown then no shutdown the interface
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Error-Disabled Interfaces: Auto-Recovery (with commands)

A

You can bring error disabled ports back into service automatically after they have been disabled for a configurable period of time

Errdisable recovery cause psecure-violation
Errdisable recovery interval 600

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Port Security: Configure Maximum Addresses (with command)

A

Max MAC addresses in port security by default is one for an interface
This can be increased if multiple hosts share the port
Ex: IP phone with PC plugged into the back of it

interface f0/2
switchport port-security maximum 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Command: Configure Static MAC on interface F0/10

A

interface f0/10
Switchport port-security
Switchport port-security mac-address 111.222.333
Switchport port-security maximum 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MAC Address Learning

A

Scenario: You have 1000 authorized hosts connected to the network. You want to lock the ports down to these particular hosts
-Manually adding the MACs is not a scalable solution

Sticky MAC addresses add the learned MAC to the running config. Save to the startup config to make permanent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Command: Configure MAC Address Learning on interface F0/2

A

interface f0/2
switchport port-security
switchport port-security mac-address sticky

17
Q

Command: Verify MACs associated with interfaces

A

show port-security address

18
Q

Command: Verify general port-security info

A

show port-security