Go to main content

Oracle® Server X7-2L Security Guide

Exit Print View

Updated: September 2017
 
 

Network Switches and Ports

Network switches offer different levels of port security features. Refer to the switch documentation to learn how to do the following:

  • Use authentication, authorization, and accounting features for local and remote access to the switch.

  • Change every password on network switches that might have multiple user accounts and default passwords.

  • Manage switches out-of-band (separated from data traffic). If out-of-band management is not feasible, then dedicate a separate virtual local area network (VLAN) number for in-band management.

  • Use port mirroring capability of the switch for intrusion detection system (IDS) access.

  • Maintain a switch configuration file off-line and limit access only to authorized administrators. The configuration file should contain descriptive comments for each setting.

  • Implement port security to limit access based upon MAC addresses. Disable auto-trunking on all ports.

  • Use these port security features if they are available on your switch:

    • MAC Locking – Involves associating a Media Access Control (MAC) address of one or more connected devices to a physical port on a switch. If you lock a switch port to a particular MAC address, superusers cannot create "backdoors" into your network with rogue access points.

    • MAC Lockout – Disables a specified MAC address from connecting to a switch.

    • MAC Learning – Uses the knowledge about each switch port's direct connections so that the network switch can set security based on current connections.