<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Switchport Trunk Security Concerns in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840466#M1100700</link>
    <description>&lt;P&gt;We are discussing the best way to place PCs onto their desired VLAN. It has been offered that we make all switchports trunks and do VLAN tagging from the PC NICs. How dangerous is this from the perspective that all switchports would be trunks?&lt;/P&gt;</description>
    <pubDate>Mon, 22 May 2023 18:40:40 GMT</pubDate>
    <dc:creator>Red Taco</dc:creator>
    <dc:date>2023-05-22T18:40:40Z</dc:date>
    <item>
      <title>Switchport Trunk Security Concerns</title>
      <link>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840466#M1100700</link>
      <description>&lt;P&gt;We are discussing the best way to place PCs onto their desired VLAN. It has been offered that we make all switchports trunks and do VLAN tagging from the PC NICs. How dangerous is this from the perspective that all switchports would be trunks?&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 18:40:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840466#M1100700</guid>
      <dc:creator>Red Taco</dc:creator>
      <dc:date>2023-05-22T18:40:40Z</dc:date>
    </item>
    <item>
      <title>Re: Switchport Trunk Security Concerns</title>
      <link>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840474#M1100701</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/98111"&gt;@Red Taco&lt;/a&gt; thats a lot of effort to configure the PCs NIC to tag a VLAN. The standard way is to explictly configure the switchport connected to the PC as an access port and disable DTP, to ensure the PC does not attempt to negotiate a trunk automatically.&lt;/P&gt;
&lt;PRE&gt;switchport mode access&lt;BR /&gt;switchport access vlan X&lt;BR /&gt;switchport nonegotiate&lt;/PRE&gt;
&lt;P&gt;If you want to dynamically assign VLANs then you can assign the computer to the VLAN from a RADIUS if using 802.1X.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 18:48:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840474#M1100701</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-05-22T18:48:14Z</dc:date>
    </item>
    <item>
      <title>Re: Switchport Trunk Security Concerns</title>
      <link>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840475#M1100702</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;First you need to make sure you PCs supports tag, not all does. But, the proper way to put PCs in their vlans is by using the access mode. &amp;nbsp; I dont think it is dangerous to have all ports in trunk mode but it not necessary.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;The standard is trunk connects switches and routers and access PCs and servers.&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 18:49:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840475#M1100702</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-05-22T18:49:09Z</dc:date>
    </item>
    <item>
      <title>Re: Switchport Trunk Security Concerns</title>
      <link>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840477#M1100703</link>
      <description>&lt;P&gt;&lt;A href="https://www.ciscopress.com/articles/article.asp?p=1681033&amp;amp;seqNum=3" target="_blank"&gt;https://www.ciscopress.com/articles/article.asp?p=1681033&amp;amp;seqNum=3&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;this security issue and it can lead to VLAN hopping attack&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 18:50:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840477#M1100703</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-22T18:50:07Z</dc:date>
    </item>
    <item>
      <title>Re: Switchport Trunk Security Concerns</title>
      <link>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840478#M1100704</link>
      <description>&lt;P&gt;That's the method I would typically use, but we have PCs that move around a lot and we're looking for a less manual method - something we could do once and would work no matter where the PC is moved (even another physical site using the same VLANs).&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 18:51:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840478#M1100704</guid>
      <dc:creator>Red Taco</dc:creator>
      <dc:date>2023-05-22T18:51:33Z</dc:date>
    </item>
    <item>
      <title>Re: Switchport Trunk Security Concerns</title>
      <link>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840480#M1100705</link>
      <description>&lt;P&gt;check below&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 19:29:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840480#M1100705</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-22T19:29:43Z</dc:date>
    </item>
    <item>
      <title>Re: Switchport Trunk Security Concerns</title>
      <link>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840481#M1100706</link>
      <description>&lt;P&gt;&lt;SPAN&gt;That's the method I would typically use, but we have PCs that move around a lot and we're looking for a less manual method - something we could do once and would work no matter where the PC is moved (even another physical site using the same VLANs).&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 18:56:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840481#M1100706</guid>
      <dc:creator>Red Taco</dc:creator>
      <dc:date>2023-05-22T18:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: Switchport Trunk Security Concerns</title>
      <link>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840482#M1100707</link>
      <description>&lt;P&gt;Then you should consider wifi.&lt;/P&gt;
&lt;P&gt;But the question I do is, does thoses PCs supports tag?&amp;nbsp; I dont think this is a very common feature on PCs..&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 18:56:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840482#M1100707</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-05-22T18:56:42Z</dc:date>
    </item>
    <item>
      <title>Re: Switchport Trunk Security Concerns</title>
      <link>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840483#M1100708</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ewa/configuration/guide/vmps.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ewa/configuration/guide/vmps.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;there is OLD tech called dynamic VLAN membership check it&amp;nbsp;&lt;BR /&gt;otherwise you need dot1x&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 18:57:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840483#M1100708</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-22T18:57:08Z</dc:date>
    </item>
    <item>
      <title>Re: Switchport Trunk Security Concerns</title>
      <link>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840484#M1100709</link>
      <description>&lt;P&gt;We're in the process of checking NIC drivers for VLAN tagging features but I wanted to check for security concerns before we get too far down that path.&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 18:58:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840484#M1100709</guid>
      <dc:creator>Red Taco</dc:creator>
      <dc:date>2023-05-22T18:58:35Z</dc:date>
    </item>
    <item>
      <title>Re: Switchport Trunk Security Concerns</title>
      <link>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840489#M1100710</link>
      <description>&lt;P&gt;Right. &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; I dont see, from the security perspect, difference between access and trunk.&amp;nbsp;&amp;nbsp; But, sounds to me a bit weird and you have better solution out there available. For example, if you deploy a radius server you would have feature able to identify the PC and assign the proper vlan dont matter where the device is connected. And with that, you also could benefit from features like dynamic ACL, port-control , MAB, etc.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 19:12:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840489#M1100710</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-05-22T19:12:21Z</dc:date>
    </item>
    <item>
      <title>Re: Switchport Trunk Security Concerns</title>
      <link>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840490#M1100711</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/98111"&gt;@Red Taco&lt;/a&gt; I would say there would be a huge administrative overhead manually configuring the PCs to trunk VLANs. As I previously mentioned you could use a dynamic solution such as ISE to authenticate, track the user/IP and assign a VLAN. Or depending on the size of your network, perhaps consider SDA fabric.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 19:12:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840490#M1100711</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-05-22T19:12:42Z</dc:date>
    </item>
    <item>
      <title>Re: Switchport Trunk Security Concerns</title>
      <link>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840491#M1100712</link>
      <description>&lt;P&gt;Thanks, I do think that's the best solution.&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 19:13:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840491#M1100712</guid>
      <dc:creator>Red Taco</dc:creator>
      <dc:date>2023-05-22T19:13:24Z</dc:date>
    </item>
    <item>
      <title>Re: Switchport Trunk Security Concerns</title>
      <link>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840492#M1100713</link>
      <description>&lt;P&gt;You are correct, the cisco high recommend not assign trunk to access port and disable DTP.&amp;nbsp;&lt;BR /&gt;let him try hope he will not under attack and loss SW connectivity.&amp;nbsp;&lt;BR /&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 19:18:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switchport-trunk-security-concerns/m-p/4840492#M1100713</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-22T19:18:53Z</dc:date>
    </item>
  </channel>
</rss>

