Module 11 – Switch Security Configuration

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/52

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

53 Terms

1
New cards

shutdown

Navigate to each unused port and issue the Cisco IOS ______ command.

2
New cards

show port-security address

To display all secure MAC addresses that are manually configured or dynamically learned on all switch interfaces, use the ________________. 

3
New cards

interface range

To configure a range of ports, use the ____________ command.

4
New cards

show port-security interface

use the _____________ command to display the current port security settings.

5
New cards

switchport port-security maximum value

To set the maximum number of MAC addresses allowed on a port.

6
New cards

1

The default port security value is ___.

7
New cards

switchport port-security

is entered, the current source MAC for the device connected to the port is automatically secured but is not added to the startup configuration. If the switch is rebooted, the port will have to re-learn the device’s MAC address.

8
New cards

switchport port-security mac-address sticky

The administrator can enable the switch to dynamically learn the MAC address and “stick” them to the running configuration by using the following command:

9
New cards

show port-security interface module and show port-security address

 command to verify the configuration.

10
New cards

Absolute

The secure addresses on the port are deleted after the specified aging time.

11
New cards

Inactivity

The secure addresses on the port are deleted only if they are inactive for the specified aging time.

12
New cards

switchport port-security aging

Use the ______________ command to enable or disable static aging for the secure port, or to set the aging time or type.

13
New cards

switchport port-security aging static

Enable aging for statically configured secure addresses on this port.

14
New cards

switchport port-security aging time time

Specify the aging time for this port. The range is 0 to 1440 minutes. If the time is 0, aging is disabled for this port.

15
New cards

switchport port-security aging type absolute

Set the absolute aging time. All the secure addresses on this port age out exactly after the time (in minutes) specified and are removed from the secure address list.

16
New cards

switchport port-security aging type inactivity

Set the inactivity aging type. The secure addresses on this port age out only if there is no data traffic from the secure source address for the specified time period.

17
New cards

aging

Use ____________ to remove secure MAC addresses on a secure port without manually deleting the existing secure MAC addresses.

18
New cards

violation

If the MAC address of a device attached to the port differs from the list of secure addresses, then a port________ occurs. By default, the port enters the error-disabled state.

19
New cards

switchport port-security violation shutdown

The port transitions to the error-disabled state immediately, turns off the port LED, and sends a syslog message. It increments the violation counter. When a secure port is in the error-disabled state, an administrator must re-enable it by entering the __________ and __________ commands.

20
New cards

switchport port-security violation restrict

The port drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value or increase the maximum value. This mode causes the Security Violation counter to increment and generates a syslog message.

21
New cards

switchport port-security violation protect

This is the least secure of the security violation modes. The port drops packets with unknown MAC source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value or increase the maximum value. No syslog message is sent.

22
New cards

err-disabled

the show interface command identifies the port status as __________.

23
New cards

secure-shutdown

The output of the show port-security interface command now shows the port status as ____________.

24
New cards

show run

To verify that MAC addresses are “sticking” to the configuration, use the ___________ command.

25
New cards

switchport mode access

Disable DTP (auto trunking) negotiations on non-trunking ports by using the _______________ interface configuration command.

26
New cards

switchport mode trunk

Manually enable the trunk link on a trunking port by using the _________ command.

27
New cards

switchport nonegotiate

Disable DTP (auto trunking) negotiations on trunking ports by using the switchport nonegotiate command.

28
New cards

switchport trunk native vlan vlan_number

Set the native VLAN to a VLAN other than VLAN 1 by using the _________________ command.

29
New cards

  1. Spoofing DTP messages

  2. Introducing a rogue switch and enabling trunking

  3. double-tagging (or double-encapsulated) attack

VLAN hopping attack can be launched in one of three ways:

30
New cards

Double-Tagging Attack

This attack takes advantage of the way hardware on most switches operate.

31
New cards

DHCP starvation attack

The goal of a _________ is to create a Denial of Service (DoS) for connecting clients.

32
New cards

Gobbler

DHCP starvation attacks require an attack tool such as _______.

33
New cards

port security

Recall that DHCP starvation attacks can be effectively mitigated by using _______________________

34
New cards

DHCP snooping

determines whether DHCP messages are from an administratively configured trusted or untrusted source.

35
New cards

ip dhcp snooping

Enable DHCP snooping by using the_________ global configuration command.

36
New cards

ip dhcp snooping trust

On trusted ports, use the ____________ interface configuration command.

37
New cards

ip dhcp snooping vlan

Enable DHCP snooping by VLAN, or by a range of VLANs, by using the __________________ global configuration command.

38
New cards

ARP Attack

a threat actor can send unsolicited ARP replies to other hosts on the subnet with the MAC Address of the threat actor and the IP address of the default gateway.

39
New cards

show ip dhcp snooping

Use the _____________ privileged EXEC command to verify DHCP snooping

40
New cards

show ip dhcp snooping binding

to view the clients that have received DHCP information.

41
New cards

Dynamic ARP Inspection (DAI)

requires DHCP snooping and helps prevent ARP attacks.

42
New cards

ip arp inspection validate {[src-mac] [dst-mac] [ip]}

global configuration command used to configure DAI to drop ARP packets when the IP addresses are invalid. It can be used when the MAC addresses in the body of the ARP packets do not match the addresses that are specified in the Ethernet header.

43
New cards

PortFast

immediately brings an interface configured as an access or trunk port to the forwarding state from a blocking state, bypassing the listening and learning states. Apply to all end-user ports.

44
New cards

BPDU Guard

guard immediately error disables a port that receives a BPDU.

45
New cards

spanning-tree portfast

PortFast can be enabled on an interface by using the _____________________ interface configuration command

46
New cards

spanning-tree portfast default

Portfast can be configured globally on all access ports by using the ______________ global configuration command.

47
New cards

show spanning-tree summary

To verify whether PortFast is enabled globally you can use the ____________________

48
New cards

show running-config interface type/number

To verify if PortFast is enabled an interface, use the __________ command.

49
New cards

errdisable recovery cause psecure_violation

If any BPDUs are received on a BPDU Guard enabled port, that port is put into error-disabled state. This means the port is shut down and must be manually re-enabled or automatically recovered through the_________________ global command.

50
New cards

spanning-tree bpduguard enable

BPDU Guard can be enabled on a port by using the ________________ interface configuration command.

51
New cards

spanning-tree portfast bpduguard default

Use the _______________ global configuration command to globally enable BPDU guard on all PortFast-enabled ports.

52
New cards

show spanning-tree summary

To display information about the state of spanning tree, use the _____________ command.

53
New cards

ip dhcp snooping limit rate

Limit the number of DHCP discovery messages that can be received per second on untrusted ports by using the _____________ interface configuration command.