Skip to main content

Port Security – Violation Action

 HAPUS KONFIG SEBELUMNYA

SW-1

Switch(config)#no errdisable recovery interval 60

Switch(config)#no errdisable recovery cause psecure-violation

Switch(config)#default int f1/0/1

R1

Router(config)#default int f0/0

Cek lagi Mac address di sisi router

R1

Router(config)#do show int f0/0 | i add

 Hardware is Gt96k FE, address is 0021.d831.1bda (bia0021.d831.1bda)

Konfi port-security DI SW-1


SW-1

Switch(config)#interface FastEthernet 1/0/1

Switch(config-if)#switchport mode access

Switch(config-if)#switchport port-security

Switch(config-if)#switchport port-security mac-address 0021.d831.1bda

Switch(config-if)#switchport port-security violation restrict


Kita rubah mac address f0/0 DI Router


R1

Router(config)#int F0/0

Router(config-if)#mac-address aaaa.bbbb.cccc

Router(config-if)#exit 


CEK

SW-1

Switch(config)#

*Mar 1 00:30:44.419: %PORT_SECURITY-2-PSECURE_VIOLATION: Security

violation occurred, caused by MAC address aaaa.bbbb.cccc on port

FastEthernet1/0/1.

*Mar 1 00:30:51.902: %LINEPROTO-5-UPDOWN: Line protocol on Interface

Vlan1, changed state to up

*Mar 1 00:30:52.699: %PORT_SECURITY-2-PSECURE_VIOLATION: Security

violation occurred, caused by MAC address aaaa.bbbb.cccc on port

FastEthernet1/0/1.

SW-1

Switch(config)#do show port-security interface

f1/0/1 Port Security : Enabled

Port Status : Secure-up

Violation Mode : Restrict

Aging Time : 0 mins

Aging Type : Absolute Secure Static

Address Aging : Disabled Maximum

MAC Addresses : 1

Total MAC Addresses : 1 Configured

MAC Addresses : 1 Sticky

MAC Addresses : 0

Last Source Address:Vlan : aaaa.bbbb.cccc:1

Security Violation Count : 5

SELESAI

Comments

Popular posts from this blog

Konfigurasi Event OSPF Adjacency (Email)

  Konfigurasi Event OSPF Adjacency (Email) LAB INI LANJUTAN SAMA SEPERTI LAB SEBELUM SEBELUMNYA Selain event syslog tadi kita juga bisa memanfaatkan EEM ini untuk mengirimkan informasi ke email kita, misalnya OSPF kita down maka, router kita otomatis akan mengirimkan debug ospf ke email kita. Untuk topology masih sama. KONFIG R1 R1(config)#event manager applet OSPF_DOWN R1(config-applet)#event syslog pattern "Nbr 2.2.2.2 on FastEthernet0/0 from FULL to DOWN" R1(config-applet)#action 1.0 cli command "enable" R1(config-applet)#action 2.0 cli command "debug ip ospf adj" R1(config-applet)#action 3.0 mail server "smtp.gmail.com" to "uuqeili@gmail.com" from "R1@idn.id" subject "OSPF IS DOWN" body "Please fix OSPF" R1(config-applet)#exit Untuk Pengecekkan, kita bisa coba debug aja,  dan hapus EEM interface down,  Dan kita bisa lihat di email kita apa hasilnyaa... selesai

Remote SPAN ( RSPAN )

  Remote SPAN  ( RSPAN ) Assalamualaikum temen - temen... kembali lagi di blogg saya, dan terimakasih telah berkunjung ke blogg saya, di blogg kali ini saya akan memberikan materi lab mengenai Remote Span  ( RSPAN ). Karena ini adalah blog lanjutan, jadi saya akan mengkonfigurasi yang hanya ada pada blog ini saja, bagi temen - temen ingin melihat konfigurasi sebelumnya ataupun blog sebelumnya mengenai BELAJAR CCNP, bisa cek link dibawah ini : https://bit.ly/37DxJrX TOPOLOGI =  SW-1 SW-1(config)#vlan 100 SW-1(config-vlan)#name RSPAN SW-1(config-vlan)#exit SW-1(config)# SW-1(config)#int e0/1 SW-1(config-if)#sw trunk encap dot1q SW-1(config-if)#sw mode tru SW-1(config-if)#exit SW-1(config)# SW-1(config)#monitor session 1 source vlan 10 SW-1(config)#monitor session 1 destination remote vlan 100 SW-2 SW-2(config)#vlan 10 SW-2(config-vlan)#name PC SW-2(config-vlan)#int e0/1 SW-2(config-if)#sw mod acc SW-2(config-if)#sw acc vlan 10 SW-2(config-if)#exit SW-2(config)# SW-2(co...

Konfigurasi Event CLI

Konfigurasi Event CLI =LAB INI LANJUTAN DARI LAB SEBELUMNYA TOPOLOGI 1 R1(config)#event manager applet SHOW_INTERFACE_UP R1(config-applet)#event cli pattern "show ip interface brief" sync yes R1(config-applet)#action 1.0 cli command "enable" R1(config-applet)#action 2.0 cli command "show ip interface brief | include up" R1(config-applet)#action 3.0 puts "$_cli_result" R1(config-applet)#action 4.0 set $_exit_status "0" SETELAH ITU BISA KALIAN CEK DENGAN DO SH IP INT BR