Basic Switch Security Configuration
-------------------------------------------------------------------
-
Switch>enable
Switch#conf t
Switch(conf)#
Switch(conf)# hostname R1
Switch(conf)#no ip domain-lookup
Switch(conf)# banner motd "No unauthorized access allowed!"
Switch(conf)# enable password class
Switch(conf)# enable secret class
Switch(conf)# service password-encryption
Switch(config)# line vty 0 15
Switch(config-line)#password cisco
Switch(config-line)#login
Switch(config)# line console 0
Switch(config-line)#password cisco
Switch(config-line)#login
Switch(config)# interface vlan 1
Switch(config-if)# ip address 192.168.1.2 255.255.255.0
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# ip default-gateway 192.168.1.1
--------------------------------------------------------------------------------
Secure and disable unused switchports.
S1(config)#int range fa0/3-24
S1(config-if-range)#switchport mode access
S1(config-if-range)#switchport access vlan 1
S1(config-if-range)#shutdown
On S1, enable port security
show port-security interface f0/1
Switch(config-if)#int fa0/1
Switch(config-if)#switchport port-security
Switch(config-if)#switchport port-security maximum 1
Switch(config-if)#switchport port-security mac-address AAA00GGF
Switch(config-if)#switchport port-security violation restrict
Switch(config-if)#switchport mode access
Basic Network:
Ports and Protocols
What is the IP address
What is the MAC address
Configuration of network routers &
switches
Ports and Protocols:
Ports are identified with numeric IDs and
are associated with specific protocols.
For example, port 80 is reserved for all
HTTP traffic.
Ports work together with IP addresses to
ensure that data gets where it needs to
go.
A port is a virtual point where network
connections start and end.
Ports are software-based and managed by
a computer's operating system.
Each port is associated with a specific
process or service.
Ports allow computers to easily
differentiate between different kinds of
traffic.
Most ports are reserved for certain
protocols — for example, all Hypertext
Transfer Protocol (HTTP) messages go to
port 80.
What are the different port numbers?
There are 65,535 possible port numbers,
although not all are in common use. Some of
the most commonly used ports, along with
their associated networking protocol, are:
Ports 20 and 21: File Transfer
Protocol (FTP). FTP is for transferring
files between a client and a server.
Port 22: Secure Shell (SSH). SSH is
one of many tunnelling protocols that
create secure network connections.
Port 53: Domain Name System
(DNS). DNS is an essential process for
the modern Internet; it matches
human-readable domain names to
machine-readable IP addresses
Most commonly used ports, along with their
associated networking protocol, are:
Port 80: Hypertext Transfer Protocol
(HTTP). HTTP is the protocol that
makes the World Wide Web possible.
Port 443: HTTP Secure (HTTPS).
HTTPS is the secure and encrypted
version of HTTP. All HTTPS web traffic
goes to port 443.
Port 3389: Remote Desktop Protocol
(RDP). RDP enables users to remotely
connect to their desktop computers
from another device.
What is the IP address
An IP address definition is a numeric label
assigned to devices that use the internet to
communicate.
Public IP address
A public IP address is a unique IP address
assigned to your network router by your
internet service provider and can be accessed
directly over the internet.
Private IP Address
The Private IP Address of a system is the IP
address that is used to communicate within
the same network.
What is the MAC address?
A MAC address is a unique identifier assigned
to a network interface controller (NIC) for use
as a network address in communications
within a network