Port security will help you when you want to ensure that particular mac address is enter switch on particular port but not prevent user to change ip address , statics arp is the most stupid part that most administrators does becouse router never send arp request to see are this device are there and blindly send traffic for this device encapsulated with static mac that not exist in bridging tables and this traffic is unknow unicast flooded accross the all switches bridges :)) and all devices , impact can be vary on value of sended traffic :)) , my suggestions is to use cisco multihost 802.1x implementation or play with private vlans .

br,
CCNP Atanas Yankov
Network Administrator
AngelSoft Ltd.

Jon Otterholm wrote:

To prevent users from MAC-spoofing - buy a switch with some kind of "port-security". If you could lock down a port to just one MAC and have a static ARP on the router it would be pretty hard to spoof the MAC-address. With another MAC than the one associated with the port you simply will not be able to talk to anyone.


To take security one step further you could use some kind of RADIUS authentication (MAC/user/computer/??).

Dlink 3526/3550 have these functions. In addition you could lock down the switch so that "user-ports" only could talk to the uplink port and never with each other.


And NO - I am not a Dlink employee, just a big fan.

/Jon
_______________________________________________
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"



_______________________________________________
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to