How Can I Protect My Ports?

Home > Blogs > Cisco > How Can I Protect My Ports?

How Can I Protect My Ports?

Like This Blog 1 Mark Jacob
Added by November 8, 2013

Let your mind wander back in time to the days when you and all your neighbors shared the same piece of the network and you could view their traffic and they could view yours. That was a kinder gentler time in history. You probably can’t even conceive of such a thing happening in this age of increased security awareness and personal information protection. But if you are the network administrator responsible for avoiding the above scenario, how do you go about configuring a solution to such a situation?

The more expensive solution is known as private vlans. However, a company must be running more than just your average switch to configure this solution. What if you work for a smaller company that does not have the resources to purchase switches that support private vlans? All is not lost. There is a less expensive alternative. It is called protected ports. The network admin can provide a functionality similar to private vlans without the considerable investment in high-end networking equipment needed.

The overall result of configuring protect ports is that host on protected ports can’t talk to each other even though they are in the same subnet. One main difference between private vlans and protected ports is that protected ports are only locally significant whereas private vlan information can be propagated throughout your entire switch fabric. Let’s see what it looks like.


In the above scenario, we have two hosts plugged into a switch. The PCs are in the same subnet. Let’s imagine that the PC on the left is plugged into port f0/1 on our 2950 switch. (Yes, the 2950, as well as the 2960 support protected ports.)  Let’s imagine that the PC on the left is plugged into port f0/1 on our switch and the PC on the right is in interface f0/2.

If only interface f0/1 is configured as a protected port, then traffic will still flow between the two endpoints. To cause the PCs not to be able to communicate at all, both interface f0/1 AND interface f0/2 need to be configured using the command switchport protected. As previously mentioned, you will get a result which is very much like using private vlans, but without the expense. To test this, you can assign IP address from the same subnet on the two PCs and generate pings from one to the other. You may want to try your ping test BEFORE you configure your protected ports and then test again AFTER you have configured them. This makes the result of the configuration clearly evident.

It may be that you have never even heard of protected ports. If that is the case, I highly recommend taking some time to familiarize yourself with them. Protected ports are a valuable way to accomplish seeming miracles using a much smaller footprint in your network admin responsibilities. Since the less-expensive, and thus more readily available, switch support this configuration, you can practice using protected ports even in an inexpensive home lab setup. Give it a shot! If this is a new command for you, it is worth getting to know it.

There is no such thing as knowing too many Cisco commands!!

Mark Jacob
Cisco Instructor – Interface Technical Training
Phoenix, AZ

Videos You May Like

Agile Methodology in Project Management

0 154 0

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

JavaScript for C# Developers – September 24, 2014

0 487 3

Is JavaScript worth taking the time to learn if I’m a server-side .NET developer? How much of C# carries over to JavaScript? In this recorded video from Dan Wahlin’s webinar on September 24,2014, Dan answers these questions and more while also discussing similarities between the languages, key differences, and the future of JavaScript (ES6). If … Continue reading JavaScript for C# Developers – September 24, 2014

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 608 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

See what people are saying...

  1. Pingback: Cisco Switches - How to Configure Private-VLANs

Share your thoughts...

Please fill out the comment form below to post a reply.