You are the network security administrator for Big Money Bank Co. You are informed that an attacker has performed a CAM table overflow attack by sending spoofed MAC addresses on one of the switch ports. The attacker has since been identified and escorted out of the campus. You now need to take action to configure the switch port to protect against this kind of attack in the future.
For purposes of this test, the attacker was connected via a hub to the Fa0/12 interface of the switch. The topology is provided for your use. The enable password of the switch is cisco. Your task is to configure the Fa0/12 interface on the switch to limit the maximum number of MAC addresses that are allowed to access the port to two and to shutdown the interface when there is a violation.
Answer and Explanation
The purpose of this sim is straightforward:
- Limit the maximum number of MAC addresses that are allowed to access the port to two.
- Shutdown the interface when there is a violation.
Please remember that we have to access interface Fa0/12 to fulfill the requirements. Before making any configuration, we should use the show running-config to check the status of interface Fa0/12
The interface Fa0/12 hasn’t been configured with anything.
Switch(config-if)#switchport mode access
First, enable the “port security” feature on this interface:
Set the maximum number of secure MAC addresses for this interface to 2:
Switch(config-if)#switchport port-security maximum 2
Shutdown if the security is violated:
Switch(config-if)#switchport port-security violation shutdown
Now you should check if the configuration is correct or not by typing the command show port-security interface fa0/12
Switch#show port-security interface fa0/12
Notice that the parameters should be like this:
+ Port Security: Enabled
+ Violation Mode: Shutdown
+ Maximum MAC Address: 2
Save the configuration
Switch#copy running-config startup-config
Just for your information, when the security is violated the port is in the error-disabled state. We can bring it out of this state by entering the “errdisable recovery cause psecure-violation” global configuration command or we can manually re-enable it by entering the “shutdown” and “no shutdown” commands in the interface configuration.