Application Scenarios for Port Security
Port security usually applies to the following scenarios:
- The access device configured with port security can defend against attacks initiated by an unauthorized user using another interface.
- The aggregation device configured with port security can limit the number of access users.
Configuring Port Security at the Access Layer
As shown in Figure 11-1, PC1 and PC3 connect to SwitchA using IP phones, and PC2 directly connects to SwitchA. To ensure access device security and defend against attacks from unauthorized users, configure port security on the interface of SwitchA.
- If access users frequently change the locations, you can configure port security to convert dynamic MAC addresses into dynamic secure MAC addresses. This function ensures that bound MAC address entries are deleted immediately when users change the locations.
- If access users seldom change the locations, you can configure port security to convert dynamic MAC addresses into sticky MAC addresses. This function ensures that bound MAC address entries are not lost after a device reset.
Configuring Port Security at the Aggregation Layer
As shown in Figure 11-2, multiple PCs communicate with the switch through SwitchA on a tree network. To ensure aggregation device security and limit the number of access users, configure port security on the aggregation device and set the maximum number of secure MAC addresses.