交换机安全配置: Difference between revisions

From The Power of Many
No edit summary
No edit summary
 
Line 1: Line 1:
__FORCETOC__
__FORCETOC__
===端口安全===
===端口安全===
   <syntaxhighlight>
   <syntaxhighlight lang="vim">
   Switch>enable
   Switch>enable
   Switch#configure terminal
   Switch#configure terminal
Line 17: Line 17:


violation shutdown触发之后端口进入err-disable状态 可在全局设置err-disable自动恢复
violation shutdown触发之后端口进入err-disable状态 可在全局设置err-disable自动恢复
   <syntaxhighlight>
   <syntaxhighlight lang="vim">
   #errdisable recovery cause psecure-violation
   #errdisable recovery cause psecure-violation
   #errdisable recovery cause mac-locking
   #errdisable recovery cause mac-locking
Line 27: Line 27:


全局配置port-security
全局配置port-security
  <syntaxhighlight>
  <syntaxhighlight lang="vim">
   switchport port-security
   switchport port-security
  </syntaxhighlight>
</syntaxhighlight>


端口配置port-security
端口配置port-security
   <syntaxhighlight>
   <syntaxhighlight lang="vim">
   switchport port-security
   switchport port-security
   switchport port-securtiy maximum 3
   switchport port-securtiy maximum 3
   switchport port-security mac-address sticky  
   switchport port-security mac-address sticky  
   switchport port-security violation shutdown
   switchport port-security violation shutdown
  </syntaxhighlight>
  </syntaxhighlight>


===DHCP安全===
===DHCP安全===
开启dhcp snooping 只在接入层交换机开启
开启dhcp snooping 只在接入层交换机开启
   <syntaxhighlight>
   <syntaxhighlight lang="vim">
   ip dhcp snooping
   ip dhcp snooping
   ip dhcp snooping vlan 10
   ip dhcp snooping vlan 10
Line 47: Line 47:
   </syntaxhighlight>
   </syntaxhighlight>


   <syntaxhighlight>
   <syntaxhighlight lang="vim">
   #untrusted port (end suer port)
   #untrusted port (end suer port)
   int fastethernet 1/0/1
   int fastethernet 1/0/1
Line 89: Line 89:
===mac-based vlan===
===mac-based vlan===
全局下
全局下
   <syntaxhighlight>
   <syntaxhighlight lang="vim">
     vlan 2
     vlan 2
     vlan association mac xxxx.xxxx.xxxx  
     vlan association mac xxxx.xxxx.xxxx  
Line 95: Line 95:


查看
查看
   <syntaxhighlight>
   <syntaxhighlight lang="vim">
   show vlan association mac
   show vlan association mac
   </syntaxhighlight>
   </syntaxhighlight>
[[Category:Networking]]
[[Category:Networking]]

Latest revision as of 03:49, 21 June 2020

端口安全

   Switch>enable	
   Switch#configure terminal	
   Switch(config)#interface fastethernet 0/1	
   Switch(config-if)#switchport mode access	
   Switch(config-if)#switchport access vlan 10
   Switch(config-if)#switchport port-security	
   Switch(config-if)#switchport port-security maximum 1	
   #Set limit for hosts that can be associated with interface. Default value is 1. Skip this command to use default value.
   Switch(config-if)#switchport port-security violation shutdown	
   #Set security violation mode. Default mode is shutdown. Skip this command to use default mode.
   Switch(config-if)#switchport port-security mac-address sticky	
   #Enable sticky feature.

violation shutdown触发之后端口进入err-disable状态 可在全局设置err-disable自动恢复

   #errdisable recovery cause psecure-violation
   #errdisable recovery cause mac-locking
   #errdisable recovery interval 30 	#(30s)

也可手动 shutdown / no shutdown 开启端口


全局配置port-security

   switchport port-security

端口配置port-security

   switchport port-security
   switchport port-securtiy maximum 3
   switchport port-security mac-address sticky 
   switchport port-security violation shutdown

DHCP安全

开启dhcp snooping 只在接入层交换机开启

   ip dhcp snooping
   ip dhcp snooping vlan 10
   ip dhcp snooping verify mac-address
   #untrusted port (end suer port)
   int fastethernet 1/0/1
   ip dhcp snooping limit rate 20
   #trusted port (trunk interface)
   int fastethernet 1/0/10
   ip dhcp snooping trust

原理:

When option 82 is enabled on the switch, then this sequence of events occurs when a DHCP client sends a DHCP request:

  1. The switch receives the request and inserts the option 82 information in the packet header.
  2. The switch forwards or relays the request to the DHCP server.
  3. The server uses the DHCP option 82 information to formulate its reply and sends a response back to the switch. It does not alter the option 82 information.
  4. The switch strips the option 82 information from the response packet.
  5. The switch forwards the response packet to the client.

Suboption Components of Option 82

Option 82 as implemented on a switching device comprises the suboptions circuit ID, remote ID, and vendor ID. These suboptions are fields in the packet header:

circuit ID—Identifies the circuit (interface or VLAN) on the switching device on which the request was received. The circuit ID contains the interface name and VLAN name, with the two elements separated by a colon—for example, ge-0/0/10:vlan1, where ge-0/0/10 is the interface name and vlan1 is the VLAN name. If the request packet is received on a Layer 3 interface, the circuit ID is just the interface name—for example, ge-0/0/10.

Use the prefix option to add an optional prefix to the circuit ID. If you enable the prefix option, the hostname for the switching device is used as the prefix; for example, device1:ge-0/0/10:vlan1, where device1 is the hostname.


You can also specify that the interface description be used rather than the interface name or that the VLAN ID be used rather than the VLAN name.

remote ID—Identifies the remote host. See remote-id for details.

vendor ID—Identifies the vendor of the host. If you specify the vendor-id option but do not enter a value, the default value Juniper is used. To specify a value, you type a character string.


STP 生成树协议 防止二层交换机出现环路

在接入端口设置

mac-based vlan

全局下

    vlan 2
    vlan association mac xxxx.xxxx.xxxx

查看

   show vlan association mac