<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to secure uplink ports in ExtremeSwitching (Other)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-other/how-to-secure-uplink-ports/m-p/11325#M2353</link>
    <description>Dear community,&lt;BR /&gt;
&lt;BR /&gt;
I have a current challange in securing the uplinks. My D2 is connected to a Uplink B5. The B5 port is configured with a untagged vlan. An attacker may disconnect the D2 and gets full network access because no policy is enforced (Policies are enforced on the D2).&lt;BR /&gt;
&lt;BR /&gt;
I have NAC implemented in the network, but not on the Uplink ports.&lt;BR /&gt;
&lt;BR /&gt;
Is there a possibility to recognize the D2? And if no ETS Switch is recognized block the port?&lt;BR /&gt;
&lt;BR /&gt;
From the NAC perspective I don't see any chance to solve this problem.&lt;BR /&gt;
&lt;BR /&gt;
#########################&lt;BR /&gt;
#                                     Uplink| x#-----&lt;BR /&gt;
#                                     B5 |x#      |&lt;BR /&gt;
#########################     |&lt;BR /&gt;
                                                              |&lt;BR /&gt;
                                                              |   &lt;BR /&gt;
                                                       |&lt;BR /&gt;
                                                       #############&lt;BR /&gt;
                                                       #x|                    #&lt;BR /&gt;
                                                       #x|              D2 #&lt;BR /&gt;
                                                       #############&lt;BR /&gt;
&lt;BR /&gt;
Hope you can help me out.&lt;BR /&gt;
&lt;BR /&gt;
Best Regards,&lt;BR /&gt;
Michael&lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Tue, 25 Feb 2014 21:38:00 GMT</pubDate>
    <dc:creator>Michael_Kirchne</dc:creator>
    <dc:date>2014-02-25T21:38:00Z</dc:date>
    <item>
      <title>How to secure uplink ports</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-other/how-to-secure-uplink-ports/m-p/11325#M2353</link>
      <description>Dear community,&lt;BR /&gt;
&lt;BR /&gt;
I have a current challange in securing the uplinks. My D2 is connected to a Uplink B5. The B5 port is configured with a untagged vlan. An attacker may disconnect the D2 and gets full network access because no policy is enforced (Policies are enforced on the D2).&lt;BR /&gt;
&lt;BR /&gt;
I have NAC implemented in the network, but not on the Uplink ports.&lt;BR /&gt;
&lt;BR /&gt;
Is there a possibility to recognize the D2? And if no ETS Switch is recognized block the port?&lt;BR /&gt;
&lt;BR /&gt;
From the NAC perspective I don't see any chance to solve this problem.&lt;BR /&gt;
&lt;BR /&gt;
#########################&lt;BR /&gt;
#                                     Uplink| x#-----&lt;BR /&gt;
#                                     B5 |x#      |&lt;BR /&gt;
#########################     |&lt;BR /&gt;
                                                              |&lt;BR /&gt;
                                                              |   &lt;BR /&gt;
                                                       |&lt;BR /&gt;
                                                       #############&lt;BR /&gt;
                                                       #x|                    #&lt;BR /&gt;
                                                       #x|              D2 #&lt;BR /&gt;
                                                       #############&lt;BR /&gt;
&lt;BR /&gt;
Hope you can help me out.&lt;BR /&gt;
&lt;BR /&gt;
Best Regards,&lt;BR /&gt;
Michael&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 25 Feb 2014 21:38:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-other/how-to-secure-uplink-ports/m-p/11325#M2353</guid>
      <dc:creator>Michael_Kirchne</dc:creator>
      <dc:date>2014-02-25T21:38:00Z</dc:date>
    </item>
    <item>
      <title>RE: How to secure uplink ports</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-other/how-to-secure-uplink-ports/m-p/11326#M2354</link>
      <description>Hi Michael,&lt;BR /&gt;
&lt;BR /&gt;
   &lt;BR /&gt;
&lt;BR /&gt;
  General uplink ports will not have policies or authentication enabled since the ports are not access ports.&lt;BR /&gt;
&lt;BR /&gt;
  Can you describe in more detail what you mean by “Is there a possibility to recognize the D2? And if no ETS Switch is recognized block the port?”&lt;BR /&gt;
&lt;BR /&gt;
Scott Keene&lt;BR /&gt;
&lt;BR /&gt;
GTAC Support&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 25 Feb 2014 22:40:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-other/how-to-secure-uplink-ports/m-p/11326#M2354</guid>
      <dc:creator>Scott_Keene</dc:creator>
      <dc:date>2014-02-25T22:40:00Z</dc:date>
    </item>
    <item>
      <title>RE: How to secure uplink ports</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-other/how-to-secure-uplink-ports/m-p/11327#M2355</link>
      <description>Please set up tagging for all VLAN's and this will prevent a PC(unless they have a tagged NIC) from connecting&lt;BR /&gt;
Jason&lt;BR /&gt;</description>
      <pubDate>Tue, 25 Feb 2014 22:42:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-other/how-to-secure-uplink-ports/m-p/11327#M2355</guid>
      <dc:creator>Jason_Parker</dc:creator>
      <dc:date>2014-02-25T22:42:00Z</dc:date>
    </item>
    <item>
      <title>RE: How to secure uplink ports</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-other/how-to-secure-uplink-ports/m-p/11328#M2356</link>
      <description>Hi and thanks for the real quick reply.&lt;BR /&gt;
&lt;BR /&gt;
@Jason: That was my first Action Item, too. But tagging the packets is no big deal.&lt;BR /&gt;
&lt;BR /&gt;
@Scott: I mean it could be possible to detect a ETS Switch and force the uplink port to allow only a (ETS) switch and no other client. Even if this would be no "real" authentication it would be harder to spoof than tagging packets.&lt;BR /&gt;
&lt;BR /&gt;
The best would be to realize point-to-point Authentication. Could IEEE 802.AE help here out? Are there any plans for implement p2p Authentication?&lt;BR /&gt;
&lt;BR /&gt;
Best Regards,&lt;BR /&gt;
Michael</description>
      <pubDate>Wed, 26 Feb 2014 15:42:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-other/how-to-secure-uplink-ports/m-p/11328#M2356</guid>
      <dc:creator>Michael_Kirchne</dc:creator>
      <dc:date>2014-02-26T15:42:00Z</dc:date>
    </item>
  </channel>
</rss>

