<aside>
<img src="/icons/unfollow_gray.svg" alt="/icons/unfollow_gray.svg" width="40px" /> Port Security — A network switch feature that restricts device access to specific ports based on MAC addresses. This enhances network security by preventing unauthorized devices from connecting
</aside>
Network Switches
- Networking devices that operate at Layer 2 of the OSI model
- Use MAC addresses for traffic switching decisions through transparent bridging
- Efficiently prevent collisions, operate in full duplex mode
- Remember connected devices based on MAC addresses
- Broadcast traffic only to intended receivers, increasing security
CAM Table (Content Addressable Memory)
- Stores MAC addresses associated with switch ports
- Vulnerable to MAC flooding attacks, which can cause the switch to fail open
Port Security Implementation
- Associate specific MAC addresses with interfaces
- Prevent unauthorized devices from connecting
- Can use Sticky MACs for easier setup
- Susceptible to MAC spoofing attacks
802.1x Authentication
- Provides port-based authentication for wired and wireless networks
- Requires three roles:
- Supplicant
- Authenticator
- Authentication server
- Utilizes RADIUS or TACACS+ for actual authentication
- Prevents rogue device access