Network Access Control
Unit: 10
Lesson: 4
you better be able to trust your network administrators (i.e. pay them well)
Network Access Control is basically authenticating endpoints before they can fully connect to the network. We can do this using any type of port security mechanism.
Disable Unneeded Switch Ports
This sounds easy enough. Less attack surfaces to monitor.
MAC Filtering
Only allow access to the network from devices who's MAC addresses are on our ACL for that port.
Sticky MACs
If port security is configured for a maximum of 5 MAC addresses, we only accept traffic from the first five devices to connect to the port. All traffic from other devices are dropped, and devices on the list that are inactive for a certain amount of time are also dropped from the list.
Port Violation State
A port enters 'violation state' when a host attempts to connect with a MAC address that violates the switch's policy. There are three main courses of action:
- Protect mode: drop frames from this invalid address, but keep the port open (only usable with sticky MACs)
- Restrict mode: drops frames and alerts violations, but also keep the port open
- Shutdown mode (default): disables the port and sends alerts, must be re-opened using the
no shutdowncommand
Configuration
en,conf tint f0/2yeah yeah enter configuration modeswitchportport-securitymaximum 2Set the maximum amount of trusted MAC addressesmac-address stickyEnable Sticky MACsviolation [restrict|(protect|shutdown)Set the default port violation state.
#Netplus