Access Interface Connectivity
Configure Access Interface Connectivity
56
Best Practice User Guide for the Catalyst 3850 and Catalyst 3650 Switch Series
Note
MAC addresses that are remembered on interfaces with port security do not appear in the dynamic MAC
address table; they appear in the static MAC address table.
Step 5
Configure IP ARP inspection and (DHCP, IGMP, and so on) snooping to 100 p/s on the interface.
(Incoming ARP packets exceeding 100 p/s is not typical and is considered malicious. Those packets are
dropped and a syslog message is raised).
Step 6
Configure IP source guard to prevent IP address spoofing on the interface.
Step 7
Enable storm control on broadcast and multicast packets on the interface to protect the network from a
flood of broadcast or multicast packets.
When the configured levels are exceeded, the switch sends an SNMP trap. The interfaces are not put into
a disabled state.
Unicast packets are blocked on egress and not ingress traffic. The switch drops unknown unicast packets
from being egressed to the end device, ensuring that only the packets intended for the end device are
forwarded.
Step 8
Configure IPv6 security on the interface to secure the end devices from malicious or unexpected
operation by preventing them from transmitting IPv6 router advertisements, and IPv6 responses.
The applied policies are defined in the
workflow.
Configure QoS on an Access Interface
switchport port-security maximum
switchport port-security aging time
switchport port-security aging type inactivity
switchport port-security violation restrict
storm-control broadcast level pps
Содержание Catalyst 3850
Страница 2: ......
Страница 4: ......
Страница 10: ...Contents vi Cisco Catalyst 3850 Series and Cisco Catalyst 3650 Series Switches Best Practices Guide ...