top of page

Enhance a Network Security Using VLAN, Port Security and Access Control List

Group 12

Alkhalifah, Saad (salkhali@sfu.ca)
Kanemitsu, Mika (mkanemit@sfu.ca)

HOME: Overview

ABSTRACT

HOME: Research

Building a secure network is very complex as many malware could threaten network devices. To mitigate such threats there are several techniques and measures can be deployed in the network. This project concentrates on a switch security and examines all possible methods to prevent any damages to connected devices. Moreover, virtual local area network (VLAN), access control list (ACL) and port security will be configured on a switch to analyze its performance and results. The project will be simulated using Cisco software “Packet Tracer” version 7.2.1.

REFERENCES

HOME: Research

[1] A. Buhr, D. Lindskog, P. Zavarsky and R. Ruh, "Media Access Control Address Spoofing Attacks against Port Security." Available: https://www.usenix.org/legacy/event/woot11/tech/final_files/Buhr.pdf [Accessed 9 February 2019].
[2] "Configuring Port Security", Cisco.com, 2019. [Online]. Available: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/port_sec.pdf [Accessed: 09- Feb- 2019].
[3] K. Maddipatla and S. Agarwal, "Limiting Traffic on Local Area Networks through Switch Port Security", vol. 5, no. 8, 2015. Available: http://ijarcsse.com/Before_August_2017/docs/papers/Volume_5/8_August2015/V5I8-0292.pdf [Accessed 9 February 2019].
[4] "RFC 3488 - Cisco Systems Router-port Group Management Protocol (RGMP)", Tools.ietf.org, 2003. [Online]. Available: https://tools.ietf.org/html/rfc3488 [Accessed: 09- Feb- 2019].
[5] A. Raihan and M. Afroze, "SECURING A NETWORK BY USING VLAN, PORT SECURITY AND ACCESS CONTROL LIST", Dspace.ewubd.edu, 2016. [Online]. Available: http://dspace.ewubd.edu/bitstream/handle/123456789/2187/Md._Asif_Raihan.pdf?sequence=1&isAllowed=y [Accessed: 09- Feb- 2019].
[6] M. Jethanandani, S. Agarwal, L. Huang, and D. Blair, “The RFC Series and RFC Editor,” YANG Data Model for Network Access Control Lists, Mar. 2019.

bottom of page