Tag Archives: systems

Cisco Data Center – ACI

In this Nugget from CCNA Data Center at CBT Nuggets, students learn the basics of Cisco ACI so they can thrive later on in their studies!
Microsoft

CCDA 200-310 at CBT Nuggets – Revised Outline

CCDA

The New CCDA Date:

In addition to the CCDA outline changing, I have a revised completion date. This course completes on 12/31/2015 just in time for the new year! As you can see below – the outline grew considerably based on author and student feedback. Remember, current subscribers can enjoy many of the Nuggets that are completed right now:

CCDA Link

The New and Improved CCDA Outline :

  1. Course Introduction
  2. Plan, Build, Manage
  3. The PPDIOO Network Lifecycle
  4. Characterizing the Existing Network
  5. IP SLA
  6. Top-Down Versus Bottom-Up
  7. Case Study: Top-Down Design
  8. Building a Modular Network
  9. Applying Modularity
  10. Campus Network Design
  11. Designing Enterprise Network Security
  12. Designing the Edge Module
  13. WAN Design
  14. Branch Design
  15. Data Center Design
  16. IP Addressing
  17. Routing Protocols
  18. Case Study: IGPs
  19. Case Study: BGP
  20. QoS
  21. Wireless
  22. Case Study: Wireless
  23. Collaboration
  24. Case Study: Collaboration
  25. SDN

Port Security Basics

Security

Overview:

Catalyst switch port security is so often recommended. This is because of a couple of important points:

  • There are many attacks that are simple to carry out at Layer 2.
  • There tends to be a gross lack of security at Layer 2.
  • Port Security can guard against so many different types of attacks. Just a few to mention are MAC flooding, MAC spoofing, and rouge DHCP and APs.

There are often two main points that are confusing for engineers about this feature, however.

1.What is Sticky Learning and how does it work?

2.What is the difference between the different violation modes and how can I remember them?

Port Security Sticky Learning:

Sticky learning is a convenient way to set static MAC address mappings for MAC addresses that you allow on your network. What you do is confirm that the correct devices are connected to the appropriate switch ports. You then turn on sticky learning and the port security feature itself, for example:

switchport port-security maximum 2
switchport port-security mac-address sticky
switchport port-security

Now what happens is the 2 MAC addresses for the two devices you trust (perhaps an IP Phone and a PC) are dynamically learned by the switch. The switch automatically writes static port security entries in the running configuration for those two devices. All you have to do is save the running configuration, and poof, you are now configured with the powerful static MAC port security feature.

Please note that it is easy to forget to actually turn on port security after setting the parameters. This is what the third line is doing in the configuration above. Always use your show port-security commands to confirm you remembered this important step of the process!

This post continues – be sure to click Read More below!

E-Book Deal of the Day!icon

Continue reading Port Security Basics