Ads (728x90)

Question
You are the network security administrator for Big Money Bank Co. You are informed that an attacker has performed a CAM table overflow attack by sending spoofed MAC addresses on one of the switch ports. The attacker has since been identified and escorted out of the campus. You now need to take action to configure the switch port to protect against this kind of attack in the future.
For purposes of this test, the attacker was connected via a hub to the Fa0/12 interface of the switch. The topology is provided for your use. The enable password of the switch is cisco. Your task is to configure the Fa0/12 interface on the switch to limit the maximum number of MAC addresses that are allowed to access the port to two and to shutdown the interface when there is a violation.
PortSecuritySim_Title.jpg
Answer and Explanation
The purpose of this sim is straightforward:
  • Limit the maximum number of MAC addresses that are allowed to access the port to two.
  • Shutdown the interface when there is a violation.
Please remember that we have to access interface Fa0/12 to fulfill the requirements. Before making any configuration, we should use the show running-config to check the status of interface Fa0/12
Switch>enable
Password: cisco
Switch#show running-config
show-running-config.jpg
The interface Fa0/12 hasn’t been configured with anything.
Switch#configure terminal
Switch(config)#interface fa0/12
Switch(config-if)#switchport mode access
First, enable the “port security” feature on this interface:
Switch(config-if)#switchport port-security
Set the maximum number of secure MAC addresses for this interface to 2:
Switch(config-if)#switchport port-security maximum 2
Shutdown if the security is violated:
Switch(config-if)#switchport port-security violation shutdown
Switch(config-if)#no shutdown
Switch(config-if)#end
Now you should check if the configuration is correct or not by typing the command show port-security interface fa0/12
Switch#show port-security interface fa0/12
show_port-security_interface.jpg
Notice that the parameters should be like this:
+ Port Security: Enabled
+ Violation Mode: Shutdown
+ Maximum MAC Address: 2
Save the configuration
Switch#copy running-config startup-config
Just for your information, when the security is violated the port is in the error-disabled state. We can bring it out of this state by entering the “errdisable recovery cause psecure-violation” global configuration command or we can manually re-enable it by entering the “shutdown” and “no shutdown” commands in the interface configuration.


  1. Lab A: Configuring ASA Basic Settings and Firewall Using CLI
    Part 1: Lab Setup
    Part 2: Accessing the ASA Console and Using CLI Setup Mode to Configure Basic Settings
    Part 3: Configuring Basic ASA Settings and Interface Security Levels Using CLI
    Part 4: Configuring Routing, Address Translation, and Inspection Policy Using CLI
    Part 5: Configuring DHCP, AAA, and SSH
    Part 6: Configuring a DMZ, Static NAT, and ACLs
    Lab B: Configuring ASA Basic Settings and Firewall Using ASDM
    Part 1: Lab Setup
    Part 2: Accessing the ASA Console and ASDM
    Part 3: Configuring ASA Settings and Firewall Using the ASDM Startup Wizard
    Part 4: Configuring ASA Settings from the ASDM Configuration Menu
    Part 5: Configuring a DMZ, Static NAT, and ACLs
    Lab C: Configuring Clientless and AnyConnect Remote Access SSL VPNs Using ASDM
    Part 1: Lab Setup
    Part 2: Access the ASA Console and Prepare for VPN Configuration
    Part 3: Configuring Clientless SSL VPN Remote Access Using ASDM
    Part 4: Configuring AnyConnect Client SSL VPN Remote Access Using ASDM
    Lab D: Configuring a Site-to-Site IPsec VPN Using CCP and ASDM
    Part 1: Basic Router/Switch/PC Configuration
    Part 2: Basic ASA Configuration
    Part 3: Configuring the ISR as a Site-to-Site IPsec VPN Endpoint Using CCP
    Part 4: Configuring the ASA as a Site-to-Site IPsec VPN Endpoint Using ASDM
  2. CCNP Security
    October 29th, 2012
    http://vigorvids.com/videos/75/ASA-Firewall-Tutorials/most_recent/all_time/
    Lab A: Configuring ASA Basic Settings and Firewall Using CLI
    Part 1: Lab Setup
    Part 2: Accessing the ASA Console and Using CLI Setup Mode to Configure Basic Settings
    Part 3: Configuring Basic ASA Settings and Interface Security Levels Using CLI
    Part 4: Configuring Routing, Address Translation, and Inspection Policy Using CLI
    Part 5: Configuring DHCP, AAA, and SSH
    Part 6: Configuring a DMZ, Static NAT, and ACLs
    Lab B: Configuring ASA Basic Settings and Firewall Using ASDM
    Part 1: Lab Setup
    Part 2: Accessing the ASA Console and ASDM
    Part 3: Configuring ASA Settings and Firewall Using the ASDM Startup Wizard
    Part 4: Configuring ASA Settings from the ASDM Configuration Menu
    Part 5: Configuring a DMZ, Static NAT, and ACLs
    Lab C: Configuring Clientless and AnyConnect Remote Access SSL VPNs Using ASDM
    Part 1: Lab Setup
    Part 2: Access the ASA Console and Prepare for VPN Configuration
    Part 3: Configuring Clientless SSL VPN Remote Access Using ASDM
    Part 4: Configuring AnyConnect Client SSL VPN Remote Access Using ASDM
    Lab D: Configuring a Site-to-Site IPsec VPN Using CCP and ASDM
    Part 1: Basic Router/Switch/PC Configuration
    Part 2: Basic ASA Configuration
    Part 3: Configuring the ISR as a Site-to-Site IPsec VPN Endpoint Using CCP
    Part 4: Configuring the ASA as a Site-to-Site IPsec VPN Endpoint Using ASDM

Post a Comment