Create VLAN's + enable Port Security Cisco Switch

00:20:36
https://www.youtube.com/watch?v=i9NDd-Bj_Lo

الملخص

TLDRThis tutorial demonstrates how to configure VLANs, manage switch interfaces, and enable port security using Packet Tracer. The steps include deleting default VLANs, creating new VLANs, and configuring switches to enhance network security. Port security is essential to ensure only authorized devices can connect, and trunk connections help to carry multiple VLAN traffic effectively. Testing connectivity illustrates the effectiveness of these configurations in preventing unauthorized access while managing data flow between devices across VLANs. Overall, the tutorial emphasizes the importance of secure network design.

الوجبات الجاهزة

  • 🖥️ Create VLANs to segment networks
  • 🔒 Enable port security to restrict device access
  • 🌐 Configure trunk connections for multiple VLANs
  • ❌ Delete default VLANs for enhanced security
  • 🔌 Test connectivity between VLANs
  • 🛠️ Use commands like 'shutdown', 'no', and 'do show' effectively
  • 💻 Manage interfaces to secure endpoints
  • 📶 Assign IP addresses to devices
  • 🔄 Implement security features on both switches and routers
  • 🌟 Maintain a structured network configuration

الجدول الزمني

  • 00:00:00 - 00:05:00

    In this initial segment, the presenter outlines their previous actions, which included downloading and installing Packet Tracer, configuring network devices such as computers and servers, and setting up DHCP services for VLAN 20. The focus then shifts to creating VLANs and enabling security on interface connections among endpoint devices and between switches and routers.

  • 00:05:00 - 00:10:00

    Continuing from the last segment, the presenter demonstrates how to delete VLAN 1 and remove its associated IP addresses on both switches and the router. After this cleanup, they initiate the creation of new VLANs for different networks, ensuring a native VLAN is also set for proper functionality.

  • 00:10:00 - 00:15:00

    The next step involves securing the network by shutting down unused interfaces, making the network more robust against unauthorized access. The presenter explains how to manage multiple interfaces together using command ranges, shutting them down temporarily to demonstrate security measures against potential attacks.

  • 00:15:00 - 00:20:36

    In the final segment, the presenter discusses the implementation of port security across interfaces, detailing commands used for securing endpoint devices while permitting trunk connections between switches. They test these configurations, confirming successful connections based on the applied security policies and VLAN assignments.

اعرض المزيد

الخريطة الذهنية

فيديو أسئلة وأجوبة

  • What is VLAN?

    VLAN stands for Virtual Local Area Network, allowing network segmentation for better security and traffic management.

  • How do you delete a VLAN in Packet Tracer?

    Use the command 'no ip address' on the VLAN interface and 'shutdown' to disable it.

  • What is port security?

    Port security limits the number of devices that can connect to a switch port based on MAC addresses.

  • What command is used to create a VLAN?

    The command 'vlan [VLAN_ID]' followed by 'name [VLAN_NAME]' is used to create a VLAN.

  • How can you view existing VLANs?

    Use the command 'do show vlan' to see the current VLAN configuration.

  • What does 'shutdown' command do?

    The 'shutdown' command disables the specified interface on a switch or router.

  • What is a trunk connection?

    A trunk connection allows multiple VLANs to pass through a single switch port.

  • How do you enable port security on an interface?

    Use 'switchport port-security' commands to enable and configure it on the interface.

  • What happens if a different MAC address connects to a secured port?

    If an unrecognized MAC address connects, the port will shut down due to security violation.

  • What is the native VLAN?

    The native VLAN is used for untagged traffic on trunk links.

عرض المزيد من ملخصات الفيديو

احصل على وصول فوري إلى ملخصات فيديو YouTube المجانية المدعومة بالذكاء الاصطناعي!
الترجمات
en
التمرير التلقائي:
  • 00:00:01
    hello everyone again
  • 00:00:03
    now we're going to do a brief little bit
  • 00:00:05
    about what we do
  • 00:00:06
    till now so we download and
  • 00:00:09
    install packet racer we create a network
  • 00:00:13
    with a we give ip addresses to the
  • 00:00:18
    endpoint computers laptop servers
  • 00:00:21
    we configure switches we can figure
  • 00:00:24
    whiter we
  • 00:00:25
    we give a dhtp services to
  • 00:00:29
    vlan 20 and that's
  • 00:00:32
    it what we do we do more but
  • 00:00:36
    let's say continue and now we're going
  • 00:00:38
    to create
  • 00:00:39
    villains and enable for security on the
  • 00:00:43
    interfaces above of the end point
  • 00:00:46
    computer
  • 00:00:47
    laptops and servers and the
  • 00:00:51
    interfaces between the switches
  • 00:00:54
    and the interface between the switch to
  • 00:00:56
    the router
  • 00:00:58
    so let's begin first of all
  • 00:01:00
    [Music]
  • 00:01:02
    let's delete vlan one let's do this
  • 00:01:06
    thing
  • 00:01:07
    okay so this is to see our one month
  • 00:01:09
    three
  • 00:01:10
    enable one two three
  • 00:01:14
    config terminal and let's
  • 00:01:17
    go to interface v1 one no
  • 00:01:20
    ip edit press and
  • 00:01:24
    shut so with this command we shut the
  • 00:01:27
    villain one
  • 00:01:27
    and delete the ipad address that we gave
  • 00:01:29
    to with the one
  • 00:01:30
    we can see if we just put the mouse
  • 00:01:34
    on the switch we can see that
  • 00:01:37
    vlan 1 is done let's do the same thing
  • 00:01:40
    with this switch switch two
  • 00:01:48
    again one two three
  • 00:01:52
    one terminal
  • 00:01:55
    and the interface vlan 1
  • 00:01:59
    no with the command no and the
  • 00:02:03
    rest of the command ip address we just
  • 00:02:06
    delete
  • 00:02:07
    the products that we give earlier and we
  • 00:02:10
    do check
  • 00:02:11
    we shut the interface we don't want
  • 00:02:14
    let's go to the router
  • 00:02:16
    in the router we need to delete the
  • 00:02:18
    interface that we give to gig
  • 00:02:21
    these things we need to do in the future
  • 00:02:22
    what we do it now it's okay
  • 00:02:24
    and i explained it in the further uh
  • 00:02:27
    tutorials so let's do no ip
  • 00:02:30
    address so
  • 00:02:34
    and exit we don't need to shut down the
  • 00:02:36
    interface
  • 00:02:38
    let's go to the dhcp we don't need the
  • 00:02:40
    services it can complicate
  • 00:02:42
    the the things that we're going to do so
  • 00:02:44
    let's delete also the
  • 00:02:46
    dhcp no ip
  • 00:02:50
    dhcp pull argon
  • 00:02:53
    dsp and we with this command delete the
  • 00:02:57
    date people okay at this
  • 00:03:00
    let's begin with the villains
  • 00:03:04
    okay so what we need to do is to create
  • 00:03:06
    the villain
  • 00:03:07
    so first of all we're going
  • 00:03:11
    to create villains to each network
  • 00:03:13
    separately what we do a
  • 00:03:15
    villain 10 winner 20 win an android
  • 00:03:17
    wheel on the
  • 00:03:18
    a 200 so let's begin vlan
  • 00:03:22
    10 name villain
  • 00:03:29
    20 name vlan 20
  • 00:03:33
    villain android name villain
  • 00:03:38
    android vlan 200
  • 00:03:43
    name villain
  • 00:03:48
    what we're going to do now because vlan
  • 00:03:50
    1 was the
  • 00:03:51
    a native villain to that
  • 00:03:54
    every switch and every writer ever we're
  • 00:03:57
    going to create another native villain
  • 00:03:59
    that's called
  • 00:04:00
    name vlan 888
  • 00:04:05
    villa 888
  • 00:04:08
    name vlan 888
  • 00:04:12
    if you want to see that the villain is
  • 00:04:14
    created we just need to write the
  • 00:04:16
    comment do
  • 00:04:17
    show villain and as we can see
  • 00:04:20
    vlan 10 created 20 100 200 888
  • 00:04:24
    these things we need to do the same
  • 00:04:26
    thing in the other switch so let's go to
  • 00:04:28
    the other switch
  • 00:04:30
    save this from the vietnamese interface
  • 00:04:33
    and write vlan 10 name
  • 00:04:36
    vlan 10
  • 00:04:40
    vlan 20
  • 00:04:42
    [Music]
  • 00:04:44
    20 000 make
  • 00:04:47
    video 100 villains
  • 00:04:50
    200 names 200
  • 00:05:00
    let's see that we have all the winners
  • 00:05:02
    do show
  • 00:05:03
    villain do show
  • 00:05:06
    villain and as you can see the villain
  • 00:05:09
    is
  • 00:05:10
    already set inside the
  • 00:05:13
    villain okay so what we're going to do
  • 00:05:18
    now
  • 00:05:18
    we're going to shut down the interfaces
  • 00:05:22
    that not in use this is more secure
  • 00:05:26
    and i will show you with the attacker
  • 00:05:28
    later how
  • 00:05:29
    when we connect it to another interfaces
  • 00:05:34
    for example fa-06 it cannot get inside
  • 00:05:39
    the it cannot get inside the land
  • 00:05:42
    because we shut down a manually the
  • 00:05:45
    interface
  • 00:05:47
    okay so what we're going to do now to go
  • 00:05:49
    inside
  • 00:05:51
    the dli and
  • 00:05:55
    write the command interface range
  • 00:06:00
    range we can get together several
  • 00:06:04
    interfaces that we want and do they
  • 00:06:07
    do commands to all interfaces together
  • 00:06:10
    and not a
  • 00:06:11
    all the time for each one of them so we
  • 00:06:14
    want
  • 00:06:15
    fa zero forward slash
  • 00:06:19
    we have five
  • 00:06:23
    so this is the last one so we need six
  • 00:06:26
    to 24 and as you can see
  • 00:06:29
    we got interfaces range so what we're
  • 00:06:31
    going to do is
  • 00:06:32
    simple just shut
  • 00:06:36
    we shut all the interfaces and no
  • 00:06:39
    a computer or device can
  • 00:06:43
    connect now to the switch and i can show
  • 00:06:45
    you that with
  • 00:06:46
    just trying to connect this laptop over
  • 00:06:50
    the attacker
  • 00:06:50
    to a 50-36
  • 00:06:54
    as you can see it's on red
  • 00:06:58
    you cannot get inside the the
  • 00:07:01
    switch because the switch is shut down
  • 00:07:05
    if we're going and actually and we're
  • 00:07:08
    going to
  • 00:07:08
    interface fa fs a 0
  • 00:07:12
    4 6 and we're going to do it a
  • 00:07:16
    no shot we can see
  • 00:07:20
    that now the interface is connected to
  • 00:07:22
    the computer but if we're going again
  • 00:07:24
    and do shut
  • 00:07:28
    we can see that the computer is now
  • 00:07:30
    disconnected from the switch
  • 00:07:33
    so this is for the security thing of the
  • 00:07:37
    of the shutting down the rest of the
  • 00:07:39
    interface that's nothing new
  • 00:07:41
    and now we're going to you to to
  • 00:07:44
    port security enable the port security
  • 00:07:48
    for
  • 00:07:48
    these interfaces all right so the
  • 00:07:52
    interface
  • 00:07:53
    before that we're going to go to this
  • 00:07:54
    switch and do the same thing
  • 00:07:56
    we don't want to forget the
  • 00:08:00
    things that we need to do so
  • 00:08:03
    just a second what we're going to do is
  • 00:08:06
    get inside this
  • 00:08:08
    and interface range
  • 00:08:12
    f a 0 5
  • 00:08:16
    24 shut we shut down the interfaces
  • 00:08:21
    and now we are in switch one let's
  • 00:08:24
    make a day protectivity
  • 00:08:27
    okay so no let's get inside
  • 00:08:31
    let's say get the the interfaces to the
  • 00:08:34
    villain that we want
  • 00:08:36
    so if we're going to
  • 00:08:41
    interface range one and two interface
  • 00:08:44
    range
  • 00:08:45
    f a zero one and two
  • 00:08:49
    what we need to do is swatch switch fold
  • 00:08:59
    now the interfaces are in vlan 10 in
  • 00:09:02
    vienna 10 the computers
  • 00:09:04
    are inside vlan 10 we're going to have
  • 00:09:08
    connection between
  • 00:09:09
    the same villains so let's get inside a
  • 00:09:12
    villain through a interface fa
  • 00:09:17
    3 which brought access
  • 00:09:20
    vlan 200 and interface
  • 00:09:24
    f8 4
  • 00:09:28
    we're going to switch both access vlan
  • 00:09:31
    20 exit
  • 00:09:35
    let's do the same thing in the other
  • 00:09:37
    switch
  • 00:09:41
    and this interface
  • 00:09:45
    range fa0 1.2
  • 00:09:50
    switchboard access vlan 20
  • 00:09:54
    we have also these two vlan 200 so
  • 00:09:57
    interface
  • 00:09:58
    fh3
  • 00:10:02
    a switchboard access vlan
  • 00:10:06
    200 and we also have the server so
  • 00:10:11
    interface fa 45
  • 00:10:16
    interface range when we take
  • 00:10:20
    several interfaces it's range so
  • 00:10:23
    switchboard access vlan android
  • 00:10:27
    let's say in the comments that we have
  • 00:10:30
    everything in the villains
  • 00:10:32
    will show villain and as we can see
  • 00:10:35
    one and two it's in villain 20.
  • 00:10:38
    four and five it can be 100
  • 00:10:42
    a tree it's in villain 200.
  • 00:10:45
    so that's correct let's see in the in
  • 00:10:47
    the other switch
  • 00:10:49
    [Music]
  • 00:10:50
    a do show
  • 00:10:54
    billion and here
  • 00:10:58
    we can see one and two it's being ten a
  • 00:11:01
    four is in vienna twenty three it's in
  • 00:11:04
    vlan 200
  • 00:11:05
    so that's correct let's begin and let's
  • 00:11:09
    move on and go to the post security
  • 00:11:14
    so what we need to do is um
  • 00:11:18
    now when we when we take the security
  • 00:11:21
    we need access for security mode
  • 00:11:24
    because we are a connect the interfaces
  • 00:11:28
    from
  • 00:11:29
    endpoint devices to the switch
  • 00:11:32
    between switches it's going to be a
  • 00:11:34
    trunk because
  • 00:11:35
    if we want only one mac address from
  • 00:11:39
    this
  • 00:11:39
    interface connect to this server or one
  • 00:11:42
    mac address connect from this computer
  • 00:11:44
    to this
  • 00:11:45
    switch that is more secure when we want
  • 00:11:49
    that a a several connections several mac
  • 00:11:52
    addresses and several vlans and several
  • 00:11:55
    things
  • 00:11:55
    move on from this interface to this
  • 00:11:58
    interface we need to put
  • 00:12:00
    a trunk interface in this connection in
  • 00:12:02
    mode in this country so let's
  • 00:12:04
    let's show you how it's done so let's
  • 00:12:07
    start with
  • 00:12:08
    sw1 so what we need to do
  • 00:12:12
    is interface range
  • 00:12:16
    fa 0 1 2
  • 00:12:19
    4 switch both
  • 00:12:22
    alt or switchboard port security
  • 00:12:26
    and we can see that it is dynamic so
  • 00:12:28
    what we need to do is
  • 00:12:30
    it's which fold mode access
  • 00:12:35
    after that we need to do switchboard
  • 00:12:38
    both a switchboard nate in switchboard
  • 00:12:42
    for security max one that's only
  • 00:12:46
    one mac address from a one interface
  • 00:12:49
    switchboard for security a
  • 00:12:52
    mac address sticky that
  • 00:12:55
    which mac address coming from this
  • 00:12:59
    interface
  • 00:13:00
    to the switch it's going to be sticky
  • 00:13:03
    it's going to stay you cannot come you
  • 00:13:05
    cannot
  • 00:13:07
    add another computer and then
  • 00:13:10
    another computer and connect to the uh
  • 00:13:14
    the switch going to to disable the
  • 00:13:17
    connection
  • 00:13:17
    because you know this computer mac
  • 00:13:20
    address if i connect the attacker
  • 00:13:22
    to it he said oh this is not the mac
  • 00:13:26
    address that i know
  • 00:13:27
    and then i'm not going to give you the
  • 00:13:30
    opportunity to move traffic from me
  • 00:13:34
    so this is the sticky which is sticky
  • 00:13:38
    after that we want that the switchboard
  • 00:13:42
    um no negotiate that
  • 00:13:45
    what we decided this is what it's going
  • 00:13:48
    to be
  • 00:13:49
    the attackers cannot change it i said
  • 00:13:51
    it's not negotiated
  • 00:13:52
    so it's no negotiate and
  • 00:13:56
    after that
  • 00:14:02
    after that we're going to decide that
  • 00:14:04
    when
  • 00:14:06
    something like this is going to happen
  • 00:14:07
    and the mac address
  • 00:14:09
    um it's not the same mac address that
  • 00:14:12
    same the
  • 00:14:13
    last package so the
  • 00:14:16
    switchboard pro security violation what
  • 00:14:19
    is it going to do
  • 00:14:20
    is to shut down
  • 00:14:23
    so this is all the command to this port
  • 00:14:26
    security
  • 00:14:27
    let's do the same thing in the other
  • 00:14:29
    switch
  • 00:14:30
    for the endpoint interfaces so
  • 00:14:34
    interface
  • 00:14:37
    fa zero forward slash one
  • 00:14:40
    two five
  • 00:14:44
    range i forget range
  • 00:14:47
    okay switchboard for security
  • 00:14:50
    switchboard mode access
  • 00:14:54
    switchpost
  • 00:14:57
    um and negotiate which both
  • 00:15:00
    for security mac sticky
  • 00:15:04
    switchboard which both
  • 00:15:08
    for security max one switch fold
  • 00:15:12
    switch both security violation
  • 00:15:16
    shut down
  • 00:15:20
    okay so we make all the commands
  • 00:15:24
    and now we can see
  • 00:15:28
    if the things equal so let's uh
  • 00:15:32
    send the icmp from this
  • 00:15:37
    to this computer and we can see
  • 00:15:41
    that the connection
  • 00:15:46
    is failed and we have a a
  • 00:15:50
    things that we but what we want to test
  • 00:15:53
    now it's not the connection between the
  • 00:15:54
    data it's this
  • 00:15:56
    if i put the icmp from here to here
  • 00:16:00
    now the mac address is a already
  • 00:16:06
    already inside the switch so if
  • 00:16:10
    we change
  • 00:16:19
    if we change the connection between this
  • 00:16:26
    this computer as you can see it's
  • 00:16:29
    working because nothing like this the
  • 00:16:32
    interface is a
  • 00:16:33
    okay but if we want to try to connect
  • 00:16:36
    from this to this you see
  • 00:16:39
    it's failed and they are in the same
  • 00:16:42
    network
  • 00:16:43
    in their villa so this show you that
  • 00:16:47
    the port securities work perfectly and
  • 00:16:50
    if we take
  • 00:16:52
    the connection again to this pc
  • 00:16:57
    and run a little bit of time we can see
  • 00:16:59
    that with this interface we can
  • 00:17:02
    do a connection with another pc on the
  • 00:17:06
    network after we create a post security
  • 00:17:09
    to a endpoint interfaces let's create a
  • 00:17:13
    um altitude to this
  • 00:17:16
    uh interface into this interface into
  • 00:17:19
    this interface let's start with
  • 00:17:21
    this and the 0.084 slash one
  • 00:17:28
    and switchboard for security
  • 00:17:31
    switchboard mode
  • 00:17:35
    trunk which for
  • 00:17:38
    trunks allow we're going to allowed
  • 00:17:42
    the villains villain 10 20
  • 00:17:46
    100 200 switchboard
  • 00:17:49
    tournament native
  • 00:17:52
    is villain hey
  • 00:17:56
    and switchboard no
  • 00:17:59
    switchboard no negotiate this is all
  • 00:18:03
    what we need to do
  • 00:18:04
    in this trunk now we're going to do the
  • 00:18:07
    same thing
  • 00:18:08
    exit in the gate want to point
  • 00:18:13
    this interface and we're going to give
  • 00:18:15
    him
  • 00:18:16
    a switchboard for security switchboard
  • 00:18:20
    mode trunks
  • 00:18:23
    switch for trunk allow
  • 00:18:27
    vlan 10 20
  • 00:18:31
    100 200 switchboard
  • 00:18:35
    navy switchboard rank
  • 00:18:40
    plant native zealand
  • 00:18:44
    888 switch post no negotiate
  • 00:18:48
    so what we're going to do is that
  • 00:18:52
    now we need to try that we have a
  • 00:18:54
    connection between
  • 00:18:55
    these computers to these computers
  • 00:18:59
    so if we take the vlan 20
  • 00:19:02
    and try to connect with another a a
  • 00:19:05
    piece in glass 20 that connects to this
  • 00:19:08
    switch
  • 00:19:08
    and we see that we have a successful
  • 00:19:11
    um connection and from vlan 200 to
  • 00:19:14
    windows 200
  • 00:19:16
    we have perfectly connection and from
  • 00:19:19
    vlan 10 to v920 we can see
  • 00:19:22
    that we don't have the connection in the
  • 00:19:25
    future
  • 00:19:26
    we're going to see how we're going to
  • 00:19:28
    have a connection
  • 00:19:29
    so what we do in this tutorial we create
  • 00:19:32
    vlans and
  • 00:19:36
    add the right interfaces to the right
  • 00:19:38
    villain
  • 00:19:39
    we create a port security for the
  • 00:19:43
    endpoint devices interfaces
  • 00:19:46
    and for security between the switches
  • 00:19:50
    and post security between the switch to
  • 00:19:52
    the router
  • 00:19:53
    let's do this because we don't do
  • 00:19:56
    interesting
  • 00:19:57
    one switch for all security
  • 00:20:01
    switch port mode access switch for
  • 00:20:04
    trunks allow
  • 00:20:08
    cloud venom 10
  • 00:20:11
    20 under 200 switchboard run
  • 00:20:15
    native vlan 888
  • 00:20:19
    and switchboard
  • 00:20:22
    no negotiate so that's it all for this
  • 00:20:26
    tutorial thank you guys for watching i
  • 00:20:28
    will see you in the next
  • 00:20:30
    movie video
  • 00:20:33
    movie video it doesn't matter
الوسوم
  • VLAN
  • Networking
  • Packet Tracer
  • Port Security
  • Configuration
  • Switch
  • Router
  • Trunking
  • Network Management
  • Cybersecurity