2.6. Ensuring only known devices can use a network
Notice in creating these rules some fields were not used. They could be used to refine or narrow the
focus of the rule.
Finally the ACLscreated were bound to ports on the switch. This was done using the switch menu
sequence:
Security → ACL → Basic → MAC Binding Configuration
to bring up the MAC Binding Configuration screen. The ACL name pinter-pc2 was selected
from the ACL ID pull down menu. The Unit 1 tag of the Port Selection Table was clicked, then
the selection box under port 19 was clicked resulting in a tick mark being inserted. Then the APPLY
button at the bottom of the screen was clicked. The ACL name nac-pc1 was then selected from the
ACL ID pull down menu and port 7 selected from the Port Selection Table before clicking the
APPLY button. After each click of the APPLY button an entry was added under the heading Interface
Binding Status briefly describing the ACL to port binding.
The security design was then complete.
2.6.5 Testing
Testing was performed using ping. Before any ACLs were configured and applied, PC 1 and PC 2 could
ping all devices on the network of Figure 2.5. After application of the first ACL, PC 1 could ping all
devices of the network. PC 2 could only ping the printer (d0:bf:9c:bd:4b:4d. After application of
the second ACL, PC 1 could only ping the NAS (28:c6:8e:d5:ed:08 and PC 2 only the printer. The
security design was working.
19