Port Security

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 10

PORT SECURITY

CIS 192, 26 FEB 2024


What is Port security

Why is Port security Important

How to implement a Port security


OBJECTIVE Types of port security.

Port security configuration

Disadvantage
Port Security
It is the process of ensuring that only authorized devices are
able to access a network.

Port Security can be implemented in a number of ways,

1.including by using Access Control Lists (ACLs),


2.Firewalls
3.Virtual Local Area Networks (VLANs).
WHAT IS PORT SECURITY
• Port security is the security provided at the ports of a network.
• Port security is the process of restricting access to a network by limiting which devices can
connect to the network, and how they can connect.
• Only specific devices or MAC addresses can access it.
• It is a way of controlling which devices can access the network.
• The purpose of port security is to limit the potential for unauthorized access to the network and
protect the network from malicious attacks.
• It also controls the flow of data in and out of the network.
• Port security involves configuring Access Control Lists (ACLs), firewalls, and Virtual Local
Area Networks (VLANs), as well as authentication protocols, such as RADIUS and TACACS.
By using these methods, administrators can control which devices can access the network, as
well as the types of traffic that are allowed to pass through the network.
Why is Port Security Important?
Port security is important for any network for a number of reasons.
• Firstly, it helps protect the network from unauthorized access and malicious attacks. By limiting
who can access the network, and what types of traffic are allowed to pass through it,
administrators can help ensure that only legitimate and secure traffic is able to access the
network.
• In addition, port security also helps reduce the risk of security breaches and helps maintain the
privacy and integrity of the network.
• Furthermore, port security helps to reduce network congestion by reducing the amount of traffic
on the network. By limiting which devices are allowed to access the network, administrators can
help free up bandwidth and resources so that legitimate traffic can flow freely and quickly.
• By monitoring which devices are accessing the network, administrators can also identify any
potential performance issues with the network and take steps to address them.
How to Implement Port Security in a Network?
The following steps are followed to implement port security in a network:

• Identify devices that can access the network:-


• The first step to implementing port security is to identify which devices are allowed to access the network.
• This can be done by using Access Control Lists (ACLs), which allow administrators to specify which devices are allowed access to
the network.

• Use authentication protocols to verify a device:


• Additionally, certain authentication protocols, such as RADIUS and TACACS can also be used to verify the identity of the device
before it is granted access to the network.
• Once the devices that are allowed access to the network are identified, the next step is to configure firewalls and Virtual Local Area
Networks (VLANs).

• Configure firewalls and VLANs:


• Firewalls help protect the network from unauthorized access, while VLANs help segment the network and control which devices can
access different parts of the network.

• Set up a monitoring system:


• Finally, administrators should also monitor the network to ensure that only authorized devices are accessing the network. This can be
done by using a network monitoring system, which helps to identify any malicious or suspicious activity on the network.
What are the Different Types of Port
Security?
You can configure a port in one of the three different types of violation
modes:
• Protect- It drops the packets with an unknown source address. It does so until
you delete a sufficient number of secure MAC addresses.
• Restrict- It drops the packets with foreign/unknown source addresses until
you get rid of a sufficient number of secure MAC addresses to drop below the
maximum value. It then causes the Security Violation counter to increase.
• Shutdown- It causes the interface to enter an error-disabled state
immediately. It then sends an SNMP trap notification.
Port security violation mode configuration:
You need to run the following commands to run the port security violation mode
configuration:
• Step 1: Choose the LAN port to configure.
• Router(config)# interface type1 slot/port
• Step 2: Set the violation mode and choose the action when a security violation occurs.
• Router(config-if)# switchport port-security violation {protect | restrict | shutdown}
• Step 3: Brings back the default configuration (i.e., shutdown)
• router(config-if)# no switchport port-security violation
• Step 4: Verify the violation mode configuration
• Router(config-if)# do show port-security interface type1 slot/port | include violation_mode2
• Here 1type = fastethernet, gigabitethernet, and tengigabitethenet
• 2violation mode = protect, restrict or shutdown
What are the Disadvantages of Port
Security?
The following are the noticeable cons of port security:
• it takes a lot of money to install and maintain such a system as port security. It
is very expensive.
• Some of the ports are extended in a capacity beyond their limit and they lack
the resources required to implement such a security system.
• It is difficult to have a cybersecurity system in ports because i is difficult to
configure processes like managing specific cybersecurity threats unique to
each country.
Thank You

You might also like