Configuring switch port security in packet tracer

Cisco has implemented some security measures to safeguard its Cisco devices from the unauthorized access. Therefore, to be able to secure the physical ports on a Cisco Switch, we have to enable the Port Security.

There are a few options available to the user while configuring the Port Security. One such option is to limit the number of MAC Addresses that the port can connect with. This security feature does not provide complete security however it makes extremely difficult for the attacker to break into the network. The only way hacker can beat this security parameter is by finding out the attached mac-address and giving the same mac-address to the device which attackers wants to connect to the particular switch port.

Many times, some employees in the organization connect their personal devices to the switchport available in their cubicle just for the fun or sometimes for the experimental purposes and if the security is not implemented then that device can jeopardize the whole network and hackers can also this vulnerability to hack into the network.

In this lab, we will allow only one MAC Address to be able to access the interface fast Ethernet 0/2. If some other device is attached to the interface the port will go to shutdown state. Also, when the port will be shutdown then the light on the switch will turn amber on that switch port so admin can find out the issue just by looking at the physical indicator on the switch.

To enable Port Security on a Cisco switch, we have to change the ‘Switchport’ mode from dynamic to access. By default, the Switchport mode is set to dynamic. Once the Switchport mode is changed, we can then enable the Switchport security on that port.

There are couples of ways in which we can restrict devices with random mac-address to connect with the switchport.

One way is to hardcode the mac address on switch interface with command “switchport port-security mac-address [mac-address number]”

Other command that we can use is “switchport port-security mac-address sticky”, this command will stick the already attached mac-address  to the interface and other mac-address will be rejected so if devices with other mac-address will try to connect with the interface then interface will simply reject the connection and we can also configure how interface should react when the security violation take place.

  • Set maximum number of allowed mac addresses to port fastethernet 0/2 to 1
  • Port 0/2 should go to shutdown state if other mac address device try to connect

Lab Configuration

Switch(config)#interface fastethernet 0/2

Switch(config-if)#switchport mode access

Switch(config-if)#switchport port-security

Switch(config-if)#switchport port-security maximum 1

Switch(config-if)#switchport port-security violation shutdown

capstone project 7 1 secure switch ports in packet tracer

Logo

CCNA 200-301

  • CCNA 200-301 Labs
  • CCNP 350-401 ENCOR
  • CCNP 350-401 ENCOR Labs
  • CCNP 300-410 ENARSI
  • CCIE Enterprise Infrastructure
  • Cisco Packet Tracer Lab Course
  • NRS II IRP Course
  • NRS II MPLS Course
  • NRS II Service Architecture
  • Nokia Configuration Course
  • Nokia SRC Program
  • JNCIA Junos
  • HCIA (HCNA)
  • HCIA Configuration Course
  • What is Huawei R&S Certification?
  • Huawei ICT Certifications
  • Python Course
  • IPv6 Course
  • IP Multicast Course
  • NRS I Configuration Course
  • Cisco Packet Tracer How To Guide
  • Online Courses
  • Udemy Courses
  • CCNA Flashcard Questions
  • Protocol Cheat Sheets
  • Subnetting Cheat Sheet
  • Linux Cheat Sheet
  • Python Cheat Sheet
  • CLI Commands Cheat Sheets
  • Miscellaneous Cheat Sheets
  • Cisco Packet Tracer Labs
  • Cisco GNS3 Labs
  • Huawei eNSP Labs
  • Nokia GNS3 Labs
  • Short Config Videos
  • Network Tools
  • IPCisco on Social Media
  • Network Engineer Interview Questions
  • Personality Interview Training
  • Sign In/Up | Members
  • Lost password
  • Sign In/Sign Up
  • ENROLL HERE

Logo

  • Switch Port Security Configuration on Cisco Packet Tracer

switch port security

In this article, we will focus on detailed Port Security Cisco Configuration . For our Cisco Port Security Configuration , we will use the below topology. In this topology we will make examples for the configuration cases on Port Security .

You can DOWNLOAD the Packet Tracer example with .pkt format HERE .

You can download all Cisco Packet Tracer Labs on Cisco Packet Tracer Labs Page.

switch port security topology

  • 1 static MAC (PC1)
  • 1 dynamic MAC (PC2)
  • 1 violation (PC3)
  • violation type shutdown
Switch(config)# interface fastEthernet 0/1 Switch(config-if)# switchport mode access Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security maximum 2 Switch(config-if)# switchport port-security mac-address 00E0.B085.4951 Switch(config-if)# switchport port-security mac-address 0003.e445.1485 Switch(config-if)# switchport port-security violation shutdown
  • 2 dynamic MAC (PC6,PC7)
  • 1 violation (PC8)
  • violation type restrict
Switch(config)# interface fastEthernet 0/2 Switch(config-if)# switchport mode access Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security maximum 2 Switch(config-if)# switchport port-security mac-address sticky Switch(config-if)# switchport port-security violation restrict
  • 1 static MAC (PC4)
  • 2 violation (PC4,PC5)
Switch(config)# inter fastEthernet 0/3 Switch(config-if)# switchport mode access Switch(config-if)# switchport port-security maximum 1 Switch(config-if)# switchport port-security mac-address 1111.1111.1111 Switch(config-if)# switchport port-security violation shutdown
  • 1 dynamic MAC (PC10)
  • 1 violation (PC9)
  • violation type protect
Switch(config)# inter fastEthernet 0/4 Switch(config-if)# switchport mode access Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security maximum 1 Switch(config-if)# switchport port-security mac-address sticky Switch(config-if)# switchport port-security violation protect

After this Port Security configuration , connect the PC’s one by one. After this process, you will see that the Port Security configuration on switch, will avoid the unwanted devices and limit the max number of MAC addresses as configured.

You can also check the below Port Security verification commands screenshots.

Switch# show port-security Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action (Count) (Count) (Count) ——————————————————————– Fa0/1 2 2 1 Shutdown Fa0/2 2 2 1 Restrict Fa0/3 1 1 1 Shutdown Fa0/4 1 1 1 Protect ———————————————————————-
Switch# show port-security address Secure Mac Address Table ——————————————————————————- Vlan Mac Address Type Ports Remaining Age (mins) —- ———– —- —– ————- 1 0003.E445.1485 SecureConfigured FastEthernet0/1 – 1 00E0.B085.4951 SecureConfigured FastEthernet0/1 – 1 0090.21B9.4D6D SecureSticky FastEthernet0/2 – 1 0009.7C63.A238 SecureSticky FastEthernet0/2 – 1 1111.1111.1111 SecureConfigured FastEthernet0/3 – 1 0009.7C63.A238 SecureSticky FastEthernet0/4 – ——————————————————————————

capstone project 7 1 secure switch ports in packet tracer

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Network Fundamentals

  • Collision Domain vs Broadcast Domain
  • Coaxial Cable Details
  • Types of Networks
  • Top Internet Access Technologies
  • WAN Topology Types
  • Network Topology Architectures
  • Power Over Ethernet (PoE)
  • Ethernet Collisions and Troubleshooting
  • Cisco NGFW and Cisco NGIPS
  • Networking Connectors
  • Ping Command
  • Basic Cisco Router Configuration on Packet Tracer
  • ICMP (Internet Control Message Protocol)
  • Address Resolution Protocol (ARP)
  • Network Cabling
  • Network Devices
  • TCP/IP Model
  • OSI Referance Model

IPv4 Addressing

  • Verify IP Parameters for Client OS
  • VLSM Subnetting
  • IPv4 vs IPv6 Comparison
  • Cisco IP Address Configuration
  • APIPA Address
  • Private IP Address Ranges
  • Subnetting Examples
  • IP Addressing (IPv4)
  • IP Subnetting and Subnetting Examples

TCP and UDP

  • TCP Header : Sequence & Acknowledgement Number
  • TCP Handshake
  • TCP versus UDP
  • UDP (User Datagram Protocol)
  • TCP (Transmission Control Protocol)
  • TCP Header : TCP Options
  • TCP Header : TCP Window Size, Checksum & Urgent Pointer
  • TCP Header : TCP Flags
  • Voice VLAN Configuration
  • Packet Tracer VLAN Example 2
  • How to Configure Cisco VLANs
  • VTP Configuration with Packet Tracer
  • VTP (VLAN Trunking Protocol)
  • DTP and VLAN Frame Tagging protocols ISL, dot1.q
  • Cisco Packet Tracer VLAN Configuration Example
  • VLAN Port Assignment and VLAN Port Types
  • VLANs (Virtual Local Area Networks)

Switching and LANs

  • Ethernet Basics
  • Cisco Switch Configuration on Cisco Packet Tracer
  • MAC Address Lookup
  • What is a mac address
  • Local Area Networks
  • Network Topologies
  • Hubs, Switches and Routers

Spanning Tree Protocol

  • Loop Guard, Uplink Fast, Backbone Fast and UDLD
  • Portfast, Root Guard, BPDU Filter and BPDU Guard
  • PVST+ and Rapid PVST+
  • STP (Spanning Tree Protocol) Example on Packet Tracer
  • RSTP Configuration on Packet Tracer
  • STP Portfast Configuration with Packet Tracer
  • Spanning Tree Protocol Operation
  • Rapid Spanning Tree Protocol (RSTP)
  • Spanning Tree Protocol (STP)

Neighbor Discovery

  • LLDP Configuration on Cisco IOS
  • Neighbour Discovery Protocols
  • CDP Configuration with Packet Tracer

EtherChannels

  • PAgP Configuration on Cisco Devices
  • LACP Configuration on Cisco Devices
  • Link Aggregation Control Protocol (LACP)

Routing Fundamentals

  • Route Summarization
  • Routing Path Determination
  • Routing Table
  • Static Routes
  • IPv4 Floating Static Routes
  • Inter VLAN Routing Configuration on Packet Tracer
  • Switch Virtual Interface Configuration on Packet Tracer
  • Switch Virtual Interfaces
  • Inter VLAN Routing with Router on Stick
  • IP and Layer 3 Overview
  • Static Route Configuration on Cisco Routers
  • Dynamic Routing Protocols
  • OSPF Cost and SPF Algorithm
  • OSPFv3 Configuration Example on Cisco IOS
  • OSPFv3 (Open Shortest Path First Version 3)
  • Cisco Single Area OSPF Configuration
  • Other OSPF Key Points
  • OSPF Network Types
  • OSPF Area Types
  • OSPF LSA Types
  • OSPF Packet Types
  • OSPF Adjacency
  • OSPF(Open Shortest Path First) Overview

WAN (Wide Area Networks)

  • MLPPP Configuration on Cisco Packet Tracer
  • What is MLPPP?
  • Metro Ethernet Technology
  • WAN and WAN Technologies

DHCP and DNS

  • DNS Configuration on Cisco Routers
  • Domain Name System Overview
  • Router DHCP Configuration with Packet Tracer
  • DHCP IP Allocation Operation
  • DHCP (Dynamic Host Configuration Protocol)
  • NAT (Network Address Translation)
  • PAT Configuration with Packet Tracer
  • Dynamic NAT Configuration with Packet Tracer
  • Static NAT Configuration with Packet Tracer

First Hop Redundancy

  • HSRP Configuration on Cisco IOS
  • HSRP (Hot Standby Router Protocol)
  • First Hop Redundancy Protocols (FHRPs)

Network Management

  • Syslog Overview
  • Configuration Register
  • TFTP, FTP, SFTP and SCP
  • SSH Configuration on Packet Tracer
  • Syslog Configuration Cisco
  • Cisco NTP Configuration
  • NTP (Network Time Protocol)
  • SNMP Overview
  • SNMP Configuration On Cisco IOS
  • Cisco Router Password Recovery
  • IPv6 Floating Static Routes
  • IPv6 Static and Default Route Configuration
  • Stateless Address Auto Configuration
  • IPv6 NDP (Neighbour Discovery Protocol)
  • IPv6 Configuration on Cisco Packet Tracer
  • What does IPv6 bring?
  • Subnetting in IPv6
  • IPv6 Address Types
  • IPv4 and IPv6 Headers
  • IPv6 and IPv6 Addresses

Quality of Service

  • Network Traffic Types
  • Policing and Shaping in QoS
  • Classification and Marking in QoS
  • Quality of Service Overview
  • Radius Configuration for Wireless Users
  • Cisco RADIUS Server Configuration on Packet Tracer
  • TACACS+ Overview
  • RADIUS Overview
  • AAA Protocols : RADIUS and TACACS+
  • Authentication, Authorization, Accounting (AAA)
  • WLAN Frequency Bands
  • Other Wireless Network Extention Types
  • Wireless Principles
  • WLAN Components
  • Wireless Network Design Models
  • WLC Management Access Connections
  • Wireless Access Point Modes
  • Wireless Security Protocols
  • WLAN Configuration on Packet Tracer

Security Fundamentals

  • DHCP Snooping Configuration on Packet Tracer
  • Cisco Banner Configuration on Packet Tracer
  • What is DHCP Snooping?
  • Access Control Lists
  • Multifactor Authentication (MFA)
  • Dynamic ARP Inspection
  • Cyber Attacks, Network Attacks, Threats and Mitigation
  • 802.1x (Port Based Network Access Control)
  • Switch Port Security
  • Extended Access List Configuration With Packet Tracer
  • Standard Access List Configuration With Packet Tracer
  • Basic Cisco Router Security Configuration

Automation and Programmability

  • Ansible vs Puppet vs Chef
  • Chef Overview
  • Puppet Overview
  • Ansible Overview
  • Network Automation Tools
  • Interpret JSON Encoded Data
  • Cisco DNA Center
  • Cisco SD-Access
  • Data Serialization Languages: JSON, YAML, XML
  • Traditional Network Management versus Cisco DNA Center
  • Cisco DNA and Intent-Based Networking (IBN)
  • How Network Automation Impacts Network Management

SDN (Software Defined Networking)

  • What is SDN ?
  • Traditional Network Drawbacks Versus SDN
  • What Will SDN Bring?
  • SDN Architecture Components
  • SDN Terminology
  • Virtualization
  • Virtual Network Structure

Latest Lessons

  • VLSM Subnetting Part of: CCNA 200-301
  • Coaxial Cable Details Part of: CCNA 200-301
  • IPv4 vs IPv6 Comparison Part of: CCNA 200-301
  • IGMPv3 Overview Part of: IP Multicast Course
  • IGMPv3 Overview Part of: CCIE Enterprise Infrastructure
  • Subnetting IPv6 Part of: CCIE Enterprise Infrastructure
  • IPv6 and Subnetting Part of: CCNP Enterprise 350-401 ENCOR
  • IPv6 Link Local Address Type Part of: CCIE Enterprise Infrastructure
  • Cisco Switch Configuration on Cisco Packet Tracer Part of: CCNA 200-301
  • Switch Configuration on Cisco Packet Tracer Part of: Cisco Packet Tracer Lab Course
  • More Lessons

Latest Blog Posts

how-ransomware-attack-works-ipcisco.com

WHAT YOU WILL FIND?

  • 250.000+ Students All Over The World
  • 8.000+ Questions & Answers
  • 100+ Lab Files & Cheat Sheets
  • 30+ IT/Network Courses
  • A Real Desire To Help You
  • Daily Social Media Shares
  • %100 Satisfaction
  • CISCO Courses
  • NOKIA Courses
  • HUAWEI Courses
  • JUNIPER Courses
  • PYTHON Course
  • KEY Courses
  • VIDEO Courses
  • UDEMY Courses
  • Cheat Sheets
  • Configuration Files
  • Interview Questions
  • IPCisco On Social Media
  • Pärnu mnt. 139c – 14, 11317, Tallinn, Estonia
  • [email protected]

IMAGES

  1. Solved capstone Project 7-1: secure switch Ports in Packet

    capstone project 7 1 secure switch ports in packet tracer

  2. How to Configure Port Security in Cisco Packet Tracer

    capstone project 7 1 secure switch ports in packet tracer

  3. Packet Tracer Tutorial

    capstone project 7 1 secure switch ports in packet tracer

  4. Switch Port Security in Cisco Packet Tracer

    capstone project 7 1 secure switch ports in packet tracer

  5. Solved Capstone Project 10-1: Secure Switch Ports in Packet

    capstone project 7 1 secure switch ports in packet tracer

  6. Cisco Switch Port Security Packet Tracer Demonstration

    capstone project 7 1 secure switch ports in packet tracer

VIDEO

  1. Shutdown a range of unused ports

  2. Tutorial Access Point Configuration in Cisco Packet Tracer Part 1

  3. Switch Port Security Configuration In Cisco Packet Tracer

  4. Certificate Clustering in windows server 2012

  5. Configure a secure password and SSH

  6. 1.3.1.3 Packet Tracer

COMMENTS

  1. Solved capstone Project 7-1: secure switch Ports in Packet

    Question: capstone Project 7-1: secure switch Ports in Packet tracer: 1. Add a new PC to your network, as shown in Figure 7-46. Create the needed connection with a Copper Straight-Through cable, connecting PC2 to Switch1's FastEthernet0/20 interface. The link between the switch and the PC should come up automatically.

  2. Simulation Lab 7.1: Module 07 Secure Switch Ports in Packet Tracer

    FastEthernet0/3. Which comment places the switch in privileged EXEC mode? enable. Which command places the switch in global configuration mode? configure terminal. Which command enables a port on a switch? no shutdown. Study with Quizlet and memorize flashcards containing terms like In the project you clicked the CLU tab to access the switch ...

  3. M04 Capstone Project 7-1 Secure Switch Ports in Packet Tracer.docx

    View M04 Capstone Project 7-1 Secure Switch Ports in Packet Tracer.docx from COMPUTER S 3700 at Tulane University. Marcio Mladenof 09/17/2022 Networking 4. Aging, mac-address, maximum, and ... M04 - Part 2_ Capstone Project 7-1 Secure Switch Ports in Packet Tracer (1).docx. Ivy Tech Community College, Indianapolis. ECE MISC.

  4. Simulation Lab 7.1: Module 07 Secure Switch Ports in Packet Tracer

    1 / 5. Simulation Lab 7.1: Module 07 Secure Switch Ports in Packet Tracer. Get a hint. In the project you clicked the CLU tab to access the switch. What mode was the switch in when you accessed it? Click the card to flip. Interface configuration. Quizlet has study tools to help you learn anything. Improve your grades and reach your goals with ...

  5. Cisco Switch Port Security Packet Tracer Demonstration

    Demonstrating switch port security using packet tracer for the Cisco CCNAhttp://www.danscourses.com/

  6. capstone Project 7-1: secure switch Ports in Packet tracer: 1. Add

    capstone Project 7-1: secure switch Ports in Packet tracer: 1. Add a new PC to your network, as shown in Figure 7-46. Create the needed connection with a Copper Straight-Through cable, connecting PC2 to Switch1's FastEthernet0/20 interface. The link between the switch and the PC should come up automatically. Image transcription text.

  7. Configuring switch port security in packet tracer

    Set maximum number of allowed mac addresses to port fastethernet 0/2 to 1. Port 0/2 should go to shutdown state if other mac address device try to connect. Lab Configuration. Task 1. Switch (config)#interface fastethernet 0/2. Switch (config-if)#switchport mode access. Switch (config-if)#switchport port-security.

  8. Securing Switch Ports in Packet Tracer: Step-by-Step Guide

    CST 160 Assignment Capstone Project 7-1 Do Capstone Project 7-1: Secure Switch Ports in Packet Tracer on page 413 of your textbook. Note you should have completed and saved previous assignment Capstone Project 5-2 to do this assignment. 1. Paste screen capture from step 11 below. No need to answer any of the questions. 2. Make sure you save the file.

  9. Netplus 9e Mod07solutions

    Note to instructors: A Packet Tracer solution file is provided for each Packet Tracer project through the Instructors site. Some Packet Tracer projects build on earlier Packet Tracer networks. If needed for one or more students, you can provide a previous project's solution file as a start file for one of these progression projects. Capstone ...

  10. Capstone Project 7-1 Secure Switch Ports in Packet Tracer.pdf

    View full document. Step 4: a. What are the four options listed for the switchport port-security command? Answer: Aging: Port-security aging commands Mac-address: Secure mac address Maximum: max secure addresses Violation: security violation mode. Aging, mac-address, maximum, and violation. b. What are the two configuration options for the ...

  11. Simulation Lab 7.1: Module 07 Secure Switch Ports in Packet Tracer

    FastEthernet0/3. Which command places the switch in global configuration mode? configure terminal. Which command enables a port on a switch? no shutdown. Which command places the switch in privileged EXEC mode? enable. Study with Quizlet and memorize flashcards containing terms like In the project you clicked the CLI tab to access the switch ...

  12. Switch Port Security Configuration on Cisco Packet Tracer

    Switch Port Security Topology Here we will use four scenario on four switch port. According to these scenarios, the below Port Security configuration will be done: 1.port. max MAC 2. 1 static MAC (PC1) 1 dynamic MAC (PC2) 1 violation (PC3) violation type shutdown. Switch (config)# interface fastEthernet 0/1.

  13. Capstone Project 7-1 Secure Switch Ports in Packet Tracer

    What are the four options listed for the switchport port-security command? *Aging port-security, mac-address, maximum, and violation b. What are the two configuration options for the switchport port-security mac-address command? *HHH & sticky c. How many MAC addresses can be allowed using the switchport port-security maximum command? *132 d.

  14. Securing Switch Ports in Packet Tracer: Best Practices

    View M04 - Part 2 Capstone Project 7-1 Secure Switch Ports in Packet Tracer.docx from NETI 105 at Ivy Tech Community College, Indianapolis. M04 - Part 2 Capstone Project 7-1 Secure Switch Ports in ... M04 - Part 2 Capstone Project 7-1 Secure Switch Ports in Packet Tracer.docx 4.a . Aging, mac-address, maximum, and violation b.

  15. Solved Capstone Project 10-1: Secure Switch Ports in Packet

    Question: Capstone Project 10-1: Secure Switch Ports in Packet Tracer In this project, you will create a new network in Packet Tracer and configure port security on the switch. Complete the following steps: 1. Create a Packet Tracer network with one 2960 switch and two PCs, as shown in Figure 10-34. Create the needed connections with Copper ...

  16. Capstone Project: Secure Switch Ports in Packet Tracer

    Casptone 7.1-7.3. Uploaded by HighnessValorPrairieDog39. Capstone Project 7-1: Secure Switch Ports in Packet Tracer 1. Add a new PC to your network, as shown in Figure 7-46. Create the needed connection with a Copper StraightThrough cable, connecting PC2 to Switch1's FastEthernet0/20 interface. The link between the switch and the PC should come ...

  17. M04

    View M04 - Part 2 Capstone Project 7-1 Secure Switch Ports in Packet Tracer.docx from NETI 104 at Ivy Tech Community College, Indianapolis. 4.a . Aging, mac-address, maximum, and violation b. ... M07 - Part 1: Hands-On Project 11-1 Configure ACLs in Packet Tracer To get to the Hands-On Projects: Open the textbook from within the course Open the ...

  18. (Capstone Project 7-1) Secure Switch Ports in Packet Tracer What

    This allows the switch to observe the MAC address as the packets are sent across the network. To secure the switch ports, you might use the switchport port-security command in conjunction with other related commands to specify security options such as a maximum number of MAC addresses, MAC address sticky learning, and violation actions.

  19. Lab Sim 7-1 Flashcards

    Simulation Lab 7.1: Module 07 Secure Switch Ports in Packet Tracer. 5 terms. jake_smith69. Preview. CH4, terms. 8 terms. R_Malabanan. Preview. ESL 3 - Common Job Skills. Teacher 25 terms. mknichols24. Preview. Lab 8.1:Chapter 08 Subnets in Cisco Packet Tracker. 5 terms. MongulXMoney95. Preview. Simulation Lab 9.1: Module 09 Create a Path MTU ...

  20. M04

    M04 - Part 2: Capstone Project 7-1 Secure Switch Ports in Packet Tracer 4. a)aging: Port-security aging commands mac-address :Secure mac address maximum :Max secure addresses violation :Security violation mode b) H.H.H 48 bit mac address sticky Configure dynamic secure addresses as sticky c)1-132 d)protect Security violation protect mode ...