By default a port can learn 132 mac addresses on most switches. This can be 
restricted by the "Port Secure Max-mac-count (1-132)" command. If this is 
set to 1 it will not accept any additional Macs on the port.


>From: "JohnZ" 
>Reply-To: "JohnZ" 
>To: [EMAIL PROTECTED]
>Subject: Re: How to restrict hubs in a LAN [7:54937]
>Date: Sun, 6 Oct 2002 06:52:05 GMT
>
>Well, when I wrote the orginal post I knew I will have these questions.
>Basically the first layer of support or help desk if you will have more PCs
>then the drops in their cubes. This is an old building not meant for an IS
>staff so there is some frustration on their part. I am not going to 
>question
>if there is a legit need for folks to have 5 PCs when there is infact a
>seperate staging area to set up and test pcs for users. Any ways they know
>enough to be dangerous and there is no standard on hubs and I have seen
>where folks have created loops. Now with Windows XP I have seen some 
>configs
>where 2 nics have been bridged via software I am not sure with what intent.
>Although it's been made clear many times not to use hubs but this is never
>enforced and I did not want to spend my time daily trying to hunt down the
>lawless. So that's when I thought if I could config the switch this will
>discourage the hub usage or bridging within pcs. I hope that answers most 
>of
>the questions here.
>""David j""  wrote in message
>[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> > See inline..
> > Chuck's Long Road wrote:
> > >
> > > as much of a rulemeister as I am, I still have to look at this
> > > from the user
> > > standpoint. Why are users throwing their own hubs onto the
> > > network? Is there
> > > a business case to be made? Is facilities too slow getting
> > > requested cable
> > > pulls done?
> > >
> > > what is the concern with a user plugging a hub in at the desk
> > > and then
> > > connected a couple of extra PC's? if the problem is one of dual
> > > homing by
> > > accident or otherwise, I can see the issue with spanning tree
> > > recalculations. But in a single home situation,  what do you
> > > see as the
> > > issues?
> > >
> >
> > I see one issue: collisions, if you have a switched network you don't 
>want
> > to deal with collisions that hubs normally produce. I have to recognize,
> > though, that hubs sometimes are very convenient and I'm the first on 
>using
> > them.
> >
> > > when you say that "politically, it's a mess" what does that
> > > mean? high
> > > powered sales people throwing their weight around? management
> > > does not
> > > respect your input or concerns? something bad is happening, and
> > > it's rolling
> > > downhill?
> > >
> > In some environments it's politically unacceptable, I know some 
>hospitals
>in
> > which you have to fill in a lot papers before being allowed to use a PC,
>so
> > in that environments this could perfectly be part of the policy.
> >
> > > I'm not questioning the wisdom or the necessity for doing what
> > > others have
> > > suggested. I'm just wondering why it is necessary for the
> > > network manager /
> > > network staff to unilaterally cut off user access.
> > >
> > >
> > >
> > >
> > > ""John Zaggat""  wrote in message
> > > [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> > > > Thanks guys that's pretty good information, but do you think
> > > in your
> > > opinion
> > > > is that good approach to deal with this problem. Do you see
> > > any caveats
> > > and
> > > > are there any other ways this can be dealt with.
> > > > ""Kevin Wigle""  wrote in message
> > > > [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> > > > > take a look into Port Security.
> > > > >
> > > > >
> > > >
> > >
> >
>http://www.cisco.com/en/US/products/hw/switches/ps708/products_configuration
> > > > > _guide_chapter09186a008007f2dd.html
> > > > >
> > > > > In the event of a security violation, you can configure the
> > > port to go
> > > > into
> > > > > shutdown mode or restrictive mode. The shutdown mode option
> > > allows you
> > > to
> > > > > specify whether the port is permanently disabled or
> > > disabled for only a
> > > > > specified time. The default is for the port to shut down
> > > permanently.
> > > The
> > > > > restrictive mode allows you to configure the port to remain
> > > enabled
> > > during
> > > > a
> > > > > security violation and drop only packets that are coming in
> > > from
> > > insecure
> > > > > hosts.
> > > > >
> > > > > Kevin Wigle
> > > > >
> > > > >
> > > > > ----- Original Message -----
> > > > > From: "John Zaggat"
> > > > > To:
> > > > > Sent: Saturday, October 05, 2002 5:01 PM
> > > > > Subject: How to restrict hubs in a LAN [7:54937]
> > > > >
> > > > >
> > > > > > I am just trying to think of how to restrict Hubs from
> > > being used in
> > > the
> > > > > > LAN. Politically it's a mess and despite a lot of
> > > discussions certain
> > > > > people
> > > > > > are able to add hubs at will where ever they want. So I
> > > was trying to
> > > > > think
> > > > > > of a way to stop that within the switch. Now normally
> > > these ports that
> > > > the
> > > > > > hubs are connected to show several mac addresses when I
> > > do "show cam"
> > > > > which
> > > > > > gives me an idea is there any way to restrict host ports
> > > to only
> > > accept
> > > > > one
> > > > > > mac-address. I don't want to hardcode the mac-address
> > > because that
> > > would
> > > > > be
> > > > > > too much a administrative burden. But if I could restrict
> > > the port to
> > > > > accept
> > > > > > just one mac-address then that will make these hubs
> > > useless. Well
> > > > anyways
> > > > > > let me know  if I am way off here but are there any other
> > > tricks in
> > > use
> > > > by
> > > > > > any of you guys. I'll appreciate any pointers.
> > > > > > JZ
_________________________________________________________________
Chat with friends online, try MSN Messenger: http://messenger.msn.com




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=54962&t=54937
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to