| 0 comments ]

Securing the campus infrastructure is as important as designing a highly available network. If security is compromised, serious impact to business can occur.

Add a note hereThis chapter defines the potential vulnerabilities related to VLANs that can occur within a network. After the vulnerabilities are identified, solutions for each vulnerability are discussed, and configuration commands are defined.

Add a note hereThis chapter also discusses port security for denial of MAC spoofing and MAC flooding, and using private VLANs (PVLAN) and VLAN access control lists (VACL) to control VLAN traffic. VLAN hopping, Dynamic Host Control Protocol (DHCP) spoofing, Address Resolution Protocol (ARP) spoofing, and Spanning Tree Protocol (STP) attacks are also explained. This chapter also discusses potential problems, resulting solutions, and the method to secure the switch access with use of vty access control lists (ACL), and implementing Secure Shell Protocol (SSH) for secure Telnet access.

Add a note hereThis chapter concludes with a description of tools used to monitor, analyze, and troubleshoot switch performance, connectivity, and security issues.

Add a note here Switch Security Fundamentals

Add a note here Much industry attention surrounds security attacks from outside the walls of an organization and at the upper Open Systems Interconnection (OSI) layers. Network security often focuses on edge routing devices and the filtering of packets based on Layer 3 and Layer 4 headers, ports, stateful packet inspection, and so forth. This includes all issues surrounding Layer 3 and above, as traffic makes its way into the campus network from the Internet. Campus access devices and Layer 2 communication are left largely unconsidered in most security discussions, and there is lack of security at this layer.

Add a note hereThe default state of networking equipment highlights this focus on external protection and internal open communication. Firewalls, placed at the organizational borders, arrive in a secure operational mode and do not enable communication until configured to do so. Routers and switches that are internal to an organization and designed to accommodate communication, delivering needful campus traffic, have a default operational mode that forwards all traffic unless configured otherwise. Their function as devices that facilitate communication often results in minimal security configuration and renders them targets for malicious attacks. If an attack is launched at Layer 2 on an internal campus device, the rest of the network can be quickly compromised, often without detection. Also, non-malicious user intentions can also result in network disruption. Although activities such as a user plugging in a switch or a hub to a data port or configuring his or her laptop as a DHCP server are not intended to be malicious, nevertheless they can still result in network disruptions.

Add a note hereMany security features are available for switches and routers, but they must be enabled to be effective. As with Layer 3, where security had to be tightened on devices within the campus as malicious activity that compromised this layer increased; now security measures must be taken to guard against malicious activity at Layer 2. A new security focus centers on attacks launched by maliciously leveraging normal Layer 2 switch operations. Security features exist to protect switches and Layer 2 operations. However, as with access control lists (ACL) for upper-layer security, a policy must be established and appropriate features configured to protect against potential malicious acts while maintaining daily network operations.

Add a note here Security Infrastructure Services

Add a note hereSecurity is an infrastructure service that increases the integrity of the network by protecting network resources and users from internal and external threats. Without a full understanding of the threats involved, network security deployments tend to be incorrectly configured, too focused on security devices, or lacking appropriate threat-response options.

Add a note hereYou can evaluate and apply security on a module-by-module basis within the Cisco Enterprise Architecture, as shown in Figure 6-1.

Click to collapse
Add a note hereFigure 6-1: Modularizing Internal Security

Add a note here The following are some recommended-practice security considerations for each module:

  • Add a note hereThe campus core layer in the campus infrastructure module switches packets as quickly as possible. It should not perform any security functions because these would slow down packet switching.

  • Add a note hereThe building distribution layer performs packet filtering to keep unnecessary traffic from the campus core layer. Packet filtering at the building distribution layer is a security function because it prevents some unwanted access to other modules. Given that switches in this layer are usually Layer 3-aware multilayer switches, the building distribution layer is often the first location that can filter based on network layer information.

  • Add a note hereAt the building access layer, access can be controlled at the port level with respect to the data link layer information (for example, MAC addresses).

  • Add a note hereThe server farm module provides application services to end users and devices. Given the high degree of access that most employees have to these servers, they often become the primary target of internally originated attacks. Use host- and network-based intrusion prevention systems (IPS), private VLANs, and access control to provide a more comprehensive response to attacks. Onboard IDS within multilayer switches can inspect traffic flows on the server farm module.

  • Add a note here The server farm module typically includes a network management system that securely manages all devices and hosts within the enterprise architecture. Syslog provides important information regarding security violations and configuration changes by logging security-related events (authentication and so on). Other servers, including an authentication, authorization, and accounting (AAA) security server, can work in combination with the one-time password (OTP) server to provide a high level of security to all local and remote users. AAA and OTP authentication reduce the likelihood of a successful password attack.

Add a note hereSeveral reasons exist for strong protection of the campus infrastructure, including security functions in each individual element of the enterprise campus:

Add a note hereRelying on the security that has been established at the enterprise edge fails as soon as security there is compromised. Several layers of security increase the protection of the enterprise campus, where usually the most strategic assets reside.

Add a note hereIf the enterprise allows visitors into its buildings, potentially an attacker can gain physical access to devices in the enterprise campus. Relying on physical security is not enough.

Add a note hereOften, external access does not stop at the enterprise edge. Applications require at least an indirect access to the enterprise campus resources, requiring strong security.

Add a note here Unauthorized Access by Rogue Devices

Add a note hereRogue access comes in several forms, as shown in Figure 6-2. For example, because unauthorized rogue access points are inexpensive and readily available, employees sometimes plug them into existing LANs and build ad hoc wireless networks without IT department knowledge or consent. These rogue access points can be a serious breach of network security because they can be plugged into a network port behind the corporate firewall. Because employees generally do not enable any security settings on the rogue access point, it is easy for unauthorized users to use the access point to intercept network traffic and hijack client sessions.

Click to collapse
Add a note hereFigure 6-2: Unauthorized Access by Rogue Devices

Add a note hereMalicious rogue access points, although much less common than employee-installed rogue access points, are also a security concern. These rogue access points create an unsecured wireless LAN connection that puts the entire wired network at risk. Malicious rogues present an even greater risk and challenge because they are intentionally hidden from physical and network view by not broadcasting the SSID.

Add a note hereTo mitigate Spanning Tree Protocol (STP) manipulation, use the root guard and the BPDU guard enhancement commands to enforce the placement of the root bridge in the network and to enforce the STP domain borders. The root guard feature is designed to provide a way to enforce the root bridge placement in the network. The STP bridge protocol data unit (BPDU) guard is designed to enable network designers to keep the active network topology predictable. Although the BPDU guard might seem unnecessary, given that the administrator can set the bridge priority to zero, there is still no guarantee that it will be elected as the root bridge because there might be a bridge with priority zero and a lower bridge ID. A BPDU guard is best deployed toward user-facing ports to prevent unauthorized switches from being attached to the network by an attacker.

Add a note here Layer 2 Attack Categories

Add a note here Layer 2 malicious attacks are typically initiated by devices directly connected to the campus network infrastructure. The attacks can originate from a physical rogue device placed on the network for malicious purposes. The attack also can come from an external intrusion that takes control of and launches attacks from a trusted device. In either case, the network sees all traffic as originating from a legitimate connected device.

Add a note hereAttacks launched against switches and at Layer 2 can be grouped as follows:

  • Add a note hereMAC layer attacks

  • Add a note hereVLAN attacks

  • Add a note hereSpoofing attacks

  • Add a note here Attacks on switch devices

Add a note hereThese attack methods and steps to mitigate these threats are discussed in more detail in this chapter.

Add a note here Table 6-1 describes attack methods and the steps to mitigation.

Add a note here Table 6-1: Switch Security Attacks and Mitigation Steps
Open table as spreadsheet

Add a note hereAttack Method

Add a note hereDescription

Add a note hereSteps to Mitigation

Add a note here MAC Layer Attacks

Add a note hereMAC address flooding

Add a note hereFrames with unique, invalid source MAC addresses flood the switch, exhausting content addressable memory (CAM) table space, disallowing new entries from valid hosts. Traffic to valid hosts is subsequently flooded out all ports.

Add a note herePort security. MAC address VLAN access maps.

Add a note here VLAN Attacks

Add a note hereVLAN hopping

Add a note hereBy altering the VLAN ID on packets encapsulated for trunking, an attacking device can send or receive packets on various VLANs, bypassing Layer 3 security measures.

Add a note hereTighten up trunk configurations and the negotiation state of unused ports.

Add a note herePlace unused ports in a common VLAN.

Add a note hereAttacks between devices on a common VLAN

Add a note hereDevices might need protection from one another, even though they are on a common VLAN. This is especially true on service-provider segments that support devices from multiple customers.

Add a note hereImplement private VLANs (PVLAN).

Add a note here Spoofing Attacks

Add a note hereDHCP starvation and DHCP spoofing

Add a note hereAn attacking device can exhaust the address space available to the DHCP servers for a period of time or establish itself as a DHCP server in man-in-the-middle attacks.

Add a note hereUse DHCP snooping.

Add a note hereSpanning-tree compromises

Add a note here Attacking device spoofs the root bridge in the STP topology. If successful, the network attacker can see a variety of frames.

Add a note hereProactively configure the primary and backup root devices.

Add a note hereEnable root guard.

Add a note hereMAC spoofing

Add a note hereAttacking device spoofs the MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.

Add a note hereUse DHCP snooping, port security.

Add a note hereAddress Resolution Protocol (ARP) spoofing

Add a note hereAttacking device crafts ARP replies intended for valid hosts. The attacking device’s MAC address then becomes the destination address found in the Layer 2 frames sent by the valid network device.

Add a note hereUse Dynamic ARP Inspection.

Add a note hereDHCP snooping, port security.

Add a note here Switch Device Attacks

Add a note hereCisco Discovery Protocol (CDP) manipulation

Add a note hereInformation sent through CDP is transmitted in clear text and unauthenticated, allowing it to be captured and divulge network topology information.

Add a note hereDisable CDP on all ports where it is not intentionally used.

Add a note hereSecure Shell Protocol (SSH) and Telnet attacks

Add a note hereTelnet packets can be read in clear text. SSH is an option but has security issues in version 1.

Add a note hereUse SSH version 2.

Add a note hereUse Telnet with vty ACLs.


Understanding and Protecting Against MAC Layer Attack

Add a note hereA common Layer 2 or switch attack is MAC flooding, resulting in a switch’s CAM table overflow, which causes flooding of regular data frames out all switch ports. This attack can be launched for the malicious purpose of collecting a broad sample of traffic or as a denial of service (DoS) attack.

Add a note hereA switch’s CAM tables are limited in size and therefore can contain only a limited number of entries at any one time. A network intruder can maliciously flood a switch with a large number of frames from a range of invalid source MAC addresses. If enough new entries are made before old ones expire, new valid entries will not be accepted. Then, when traffic arrives at the switch for a legitimate device located on one of the switch ports that could not create a CAM table entry, the switch must flood frames to that address out all ports. This has two adverse effects:

  • Add a note here The switch traffic forwarding is inefficient and voluminous and could potentially slow down the network for all users.

  • Add a note hereAn intruding device can be connected to any switch port and capture traffic not normally seen on that port.

Add a note hereIf the attack is launched before the beginning of the day, the MAC address table (also referred to as Content Addressable Memory [CAM] table) would be full when the majority of devices are powered on. Then frames from those legitimate devices cannot create MAC address table entries as they power on. If this represents a large number of network devices, the number of MAC addresses flooded with traffic will be high, and any switch port will carry flooded frames from a large number of devices.

Add a note hereIf the initial flood of invalid MAC address table entries is a one-time event, the switch eventually ages out older, invalid MAC address table entries, allowing new, legitimate devices to create entries. Traffic flooding ceases and might never be detected, even though the intruder might have captured a significant amount of data from the network.

Add a note hereAs Figure 6-3 shows, MAC flooding occurs in this progression; the following describes MAC flooding attack progression.

Click to collapse
Add a note hereFigure 6-3: MAC Address Flooding Attack

Add a note here Step 1

Add a note hereSwitch forwards traffic based on valid MAC address table entries.

Add a note here Step 2

Add a note here Attacker (MAC address C) sends out multiple packets with various source MAC addresses.

Add a note here Step 3

Add a note hereOver a short time period, the CAM table in the switch fills up until it cannot accept new entries. As long as the attack is running, the MAC address table on the switch remains full.

Add a note here Step 4

Add a note hereSwitch begins to flood all packets that it receives out of every port so that frames sent from Host A to Host B are also flooded out of Port 3 on the switch.

Add a note here Suggested Mitigation for MAC Flooding Attacks

Add a note hereTo prevent MAC Address flooding, port security can be used. Configure port security to define the number of MAC addresses allowed on a given port. Port security can also specify what MAC address is allowed on a given port. Port security is described in the following section.

Add a note here Port Security

Add a note herePort security is a feature supported on Cisco Catalyst switches that restricts a switch port to a specific set or number of MAC addresses. Those addresses can be learned dynamically or configured statically. The port then provides access to frames from only those addresses. If, however, the number of addresses is limited to four but no specific MAC addresses are configured, the port enables any four MAC addresses to be learned dynamically, and port access is limited to those four dynamically learned addresses.

Add a note hereA port security feature called sticky learning, available on some switch platforms, combines the features of dynamically learned and statically configured addresses. When this feature is configured on an interface, the interface converts dynamically learned addresses to sticky secure addresses. This adds them to the running configuration as if they were configured using the switchport port-security mac-address interface command.

Port Security Scenario 1

Add a note hereImagine five individuals whose laptops are allowed to connect to a specific switch port when they visit an area of the building. You want to restrict switch port access to the MAC addresses of those five laptops and allow no addresses to be learned dynamically on that port.

Add a note here Table 6-2 describes the process that can achieve the desired results for this scenario.

Add a note here Table 6-2: Implementing Port Security
Open table as spreadsheet

Add a note here Step

Add a note hereAction

Add a note hereNotes

Add a note here1

Add a note hereConfigure port security.

Add a note hereConfigure port security to allow only five connections on that port. Configure an entry for each of the five allowed MAC addresses. This, in effect, populates the MAC address table with five entries for that port and allows no additional entries to be learned dynamically.

Add a note here2

Add a note hereAllowed frames are processed.

Add a note hereWhen frames arrive on the switch port, their source MAC address is checked against the MAC address table. If the frame source MAC address matches an entry in the table for that port, the frames are forwarded to the switch to be processed like any other frames on the switch.

Add a note here3

Add a note hereNew addresses are not allowed to create new MAC address table entries.

Add a note hereWhen frames with a nonallowed MAC address arrive on the port, the switch determines that the address is not in the current MAC address table and does not create a dynamic entry for that new MAC address because the number of allowed addresses has been limited.

Add a note here4

Add a note hereSwitch takes action in response to nonallowed frames.

Add a note hereThe switch disallows access to the port and takes one of these configuration-dependent actions: (a) the entire switch port can be shut down; (b) access can be denied for that MAC address only and a log error can be generated; (c) access can be denied for that MAC address but without generating a log message.

Port Security Scenario 2

Add a note hereIn this scenario, an attacker enables a hacking tool leading to the attacker’s rogue device to flood switch CAM tables with bogus MACs, which fills up the MAC address table, as shown in Figure 6-4. When the MAC address table is full, it turns the VLAN into a hub and floods all unicast frames.

Image from book
Add a note hereFigure 6-4: MAC Flood Attack on a Switch Port

Add a note hereTo prevent this attack, Figure 6-5 shows that port security is configured on the untrusted user ports. Enabling port security limits MAC flooding attacks and locks down the port. Port security also sets an SNMP trap for alerting to any violation. Port security allows the frames from already secured MAC address below the maximum number of MAC addresses enabled on that port, and any frame with new MAC address over the limit are dropped.

Image from book
Add a note hereFigure 6-5: Port Security Prevents MAC Flood Attack

Configuring Port Security

Add a note here Here are the steps to set up port security to limit switch port access to a finite number and a specific set of end-device MAC addresses.

Add a note hereTo configure port security, follow these steps:

Add a note here Step 1

Add a note hereEnable port security:

Add a note hereSwitch(config-if)#switchport port-security

Add a note here Step 2

Add a note hereSet a maximum number of MAC addresses that will be allowed on this port. Default is one:

Add a note hereSwitch(config-if)#switchport port-security maximumvalue

Add a note here Step 3

Add a note hereSpecify which MAC addresses will be allowed on this port (optional):

Add a note hereSwitch(config-if)#switchport port-security mac-address mac-address

Add a note here Step 4

Add a note hereDefine what action an interface will take if a nonallowed MAC address attempts access:

Add a note hereSwitch(config-if)#switchport port-security violation {shutdown | restrict |
protect}

Add a note here Figure 6-6 depicts an access layer Catalyst 4500 switch scenario. A real-time media server plugs in to switch port 3/47. The switch port needs port security to prevent any unauthorized devices from plugging into the same port. The administrator has configured preferential QoS policies based on all traffic received on the port and other security ACLs. The network administrator requirement is not to shut down the port of the server but rather to restrict the port to only the authorized MAC address. In addition, the network administrator configures the switch to shut down port 2/2 in the guest lobby if any unauthorized workstation plugs into that port.

Image from book
Add a note hereFigure 6-6: Port Security Configuration

Add a note here Example 6-1 shows the configuration for this scenario.

Add a note here Example 6-1: Configuration of Port Security on Cisco IOS–Based Catalyst Switches

Add a note here4503(config)# interface FastEthernet 3/47
4503(config-if)# switchport
4503(config-if)# switchport mode access
4503(config-if)# switchport port-security
4503(config-if)# switchport port-security mac-address 0000.0000.0008
4503(config-if)# switchport port-security maximum 1
4503(config-if)# switchport port-security aging static
4503(config-if)# switchport port-security violation restrict
4503(config)# interface FastEthernet 2/2
4503(config-if)# switchport
4503(config-if)# switchport mode access
4503(config-if)# switchport port-security
4503(config-if)# switchport port-security mac-address 0000.0000.1118
4503(config-if)# switchport port-security maximum 1
4503(config-if)# switchport port-security aging static
4503(config-if)# switchport port-security violation shutdown

Caveats to Port Security Configuration Steps

Add a note here Step 1

Add a note herePort security is enabled on a port-by-port basis using the switchport port-security command.

Add a note here Step 2

Add a note hereBy default, only one MAC address is allowed access through a given switch port when port security is enabled. This parameter increases that number. It implies no restriction on specific MAC addresses, just on the total number of addresses that can be learned by the port. Learned addresses are not aged out by default but can be configured to do so after a specified time using the switchport port-security aging command. The value parameter can be any number from 1 to 1024, with some restrictions having to do with the number of ports on a given switch with port security enabled. The switchport port-security aging static command enables aging for statically configured secure addresses on the port.

Add a note here Step 3

Add a note here Access to the switch port can be restricted to one or more specific MAC addresses. If the number of specific MAC addresses assigned using this command is lower than the value parameter set in Step 2, the remaining allowed addresses can be learned dynamically. If you specify a set of MAC addresses that is equal to the maximum number allowed, access is limited to that set of MAC addresses.

Add a note here Step 4

Add a note hereBy default, if the maximum number of connections is achieved and a new MAC address attempts to access the port, the switch must take one of these actions:

  • Add a note here Protect: Frames from the nonallowed address are dropped, but there is no log of the violation.

  • Add a note here Restrict: Frames from the nonallowed address are dropped, a log message is created, and a Simple Network Management Protocol (SNMP) trap is sent.

  • Add a note here Shut down: If any frames are seen from a nonallowed address, the interface is errdisabled, a log entry is made, an SNMP trap is sent, and manual intervention or errdisable recovery must be used to make the interface usable. Shutdown mode is the default mode for violation.

Verifying Port Security

Add a note hereThe show port-security command can be used to verify the ports on which port security has been enabled, as shown in Example 6-2. It also displays count information and security actions to be taken per interface.

Add a note hereThe full command syntax is as follows:

Add a note here
show port-security [interface intf_id] [address]
Add a note here Example 6-2: Verifying Port Security Operation

Add a note hereswitch# show port-security
Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action
(Count) (Count) (Count)
------------------------------------------------------------------------
Fa0/1 2 1 0 Restrict
------------------------------------------------------------------------
Total Addresses in System (excluding one mac per port) : 0
Max Addresses limit in System (excluding one mac per port) : 6144

Add a note here Arguments are provided to view port security status by interface or view the addresses associated with port security on all interfaces.

Add a note hereUse the interface argument to provide output for a specific interface, as shown in Example 6-3.

Add a note here Example 6-3: Verifying Port Security Configuration

Add a note hereswitch# show port-security interface fastethernet0/1
Port Security : Enabled
Port Status : Secure-up
Violation Mode : Restrict
Aging Time : 60 mins
Aging Type : Inactivity
SecureStatic Address Aging : Enabled
Maximum MAC Addresses : 2
Total MAC Addresses : 1
Configured MAC Addresses : 0
Sticky MAC Addresses : 0
Last Source Address:Vlan : 001b.d513.2ad2:5
Security Violation Count : 0

Add a note hereUse the address argument to display MAC address table security information, as shown in Example 6-4. The remaining age column is populated only when specifically configured for a given interface.

Add a note here Example 6-4: Verifying Port Security Using Address Argument

Add a note hereswitch# show port-security address
Secure Mac Address Table
------------------------------------------------------------------------
Vlan Mac Address Type Ports Remaining Age
(mins)
---- ----------- ---- ----- -------------
2 001b.d513.2ad2 SecureDynamic Fa0/1 60 (I)
------------------------------------------------------------------------
Total Addresses in System (excluding one mac per port) : 0
Max Addresses limit in System (excluding one mac per port) : 6144

Port Security with Sticky MAC Addresses

Add a note here Port security can mitigate spoofing attacks by limiting access through each switch port to a single MAC address. This prevents intruders from using multiple MAC addresses over a short time period but does not limit port access to a specific MAC address. The most restrictive port security implementation would specify the exact MAC address of the single device that is to gain access through each port. Implementing this level of security, however, requires considerable administrative overhead.

Add a note herePort security has a sticky MAC addresses feature that can limit switch port access to a single, specific MAC address without the network administrator having to gather the MAC address of every legitimate device and manually associate it with a particular switch port.

Add a note hereWhen sticky MAC addresses are used, the switch port converts dynamically learned MAC addresses to sticky MAC addresses and subsequently adds them to the running configuration as if they were static entries for a single MAC address to be allowed by port security. Sticky secure MAC addresses will be added to the running configuration but will not become part of the startup configuration file unless the running configuration is copied to the startup configuration after addresses have been learned. If they are saved in the startup configuration, they will not have to be relearned upon switch reboot, and this provides a higher level of network security.


Note

Add a note hereThe interface converts all the dynamic secure MAC addresses, including those that were dynamically learned before sticky learning was enabled, to sticky secure MAC addresses.

Add a note hereThe interface level configuration command that follows converts all dynamic port-security learned MAC addresses to sticky secure MAC addresses.

Add a note here
switchport port-security mac-address sticky

Add a note hereThis command cannot be used on ports where voice VLANs are configured. Example 6-5 shows the configuration and verification of the sticky MAC address feature of port security.

Add a note here Example 6-5: Configuring and Verifying Port Security Sticky MAC-Address

Add a note hereswitch# show running-config fastethernet 0/1
interface FastEthernet0/1
switchport access vlan 2
switchport mode access
switchport port-security maximum 2
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address sticky
switchport port-security mac-address sticky 001b.d513.2ad2
switch# show port-security address
Secure Mac Address Table
------------------------------------------------------------------------
Vlan Mac Address Type Ports Remaining Age
(mins)
---- ----------- ---- ----- -------------
2 001b.d513.2ad2 SecureSticky Fa0/1 -

Add a note here Blocking Unicast Flooding on Desired Ports

Add a note here By default, switches flood packets with unknown destination MAC addresses to all ports in the same VLAN as the received port’s VLAN. Some ports do not require flooding. For example, a port that has only manually assigned MAC addresses and that does not have a network device connected to that port other than the configured MAC address does not need to receive flooded packets. In addition, a port security–enabled port with a configured secure MAC address or port does not need to receive unknown unicast flooding if the port has already learned the maximum number of MAC addresses. If the network exhibits asymmetrical routing, excessive unicast flooding can occur and might cause all the devices in that VLAN to suffer as they receive the unneeded traffic. With asymmetrical routing, transmit and receive packets follow different paths between a host and the destination device. For more information about asymmetrical routing, see the following technical document at Cisco.com: “Unicast Flooding in Switched Campus Networks,” Document ID: 23563:

  • Add a note here www.cisco.com/en/US/products/hw/switches/ps700/products_tech_note09186a00801d0808.shtml

Add a note hereThe unicast flood-blocking feature prevents the forwarding of unicast flood traffic on unnecessary ports. Restricting the amount of traffic on a per-port basis adds a level of security to the network and prevents network devices from unnecessarily processing nondirected packets.

Add a note hereCisco Catalyst switches can restrict flooding of unknown multicast MAC-addressed traffic on a per-port basis, in addition to restricting flooding of unknown unicast destination MAC addresses. Use the following interface-level command:

Add a note here
switchport block {unicast | multicast}

Add a note here Example 6-6 shows a user configuring unicast and multicast flood blocking on an access layer switch.

Add a note here Example 6-6: Configuration of Unicast and Multicast Flood Filtering on a Catalyst Switch

Add a note here4503# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
4503(config)# interface FastEthernet 3/22
4503(config-if)# switchport block unicast
4503(config-if)# switchport block multicast


0 comments

Post a Comment