you NEED to learn Port Security…….RIGHT NOW!! // FREE CCNA // EP 14

แชร์
ฝัง
  • เผยแพร่เมื่อ 16 ธ.ค. 2024

ความคิดเห็น • 895

  • @WaterKing9
    @WaterKing9 2 ปีที่แล้ว +47

    This series has been massively helpful. I know you are crazy busy running a community and a business, but I would really love to see this series completed

  • @nocomment296
    @nocomment296 3 ปีที่แล้ว +96

    Hey Chuck please complete this CCNA series...
    I have started to see all your CCNA video.. it's fun to learn.

    • @mrnmrk6191
      @mrnmrk6191 2 ปีที่แล้ว +3

      give up with CCNA and get to learn Mikrotik Router OS, 1000 times better and easier

    • @curon_licentia
      @curon_licentia 2 ปีที่แล้ว

      @@mrnmrk6191 can you talk a bit about why it is better? just curious

    • @ghostmedic2009
      @ghostmedic2009 2 ปีที่แล้ว +7

      @@mrnmrk6191 are you in the network berg chat often talking about MTKs? If so we have talked. I concur that Mikrotiks rock and def easy to learn, but the certs are harder to get and require a lot more. The CCNA is more widely accepted and currently respected, so while MTKs rule and I love them and use them myself on a few networks, I would not say the CCNA cert is something one should give up, some of the tik language, and most of other routers, are based on cisco so all around a good cert, it is better than a network + for sure. Once Mikrotik makes their certs affordable and not a required class to get it, then will jump on that cert wagon lol

  • @losttownstreet3409
    @losttownstreet3409 3 ปีที่แล้ว +45

    The most common approach is: a lock on the doors and security personnel
    The next step is authentication of each deive on the port 802.1X.
    The next step is IPSec.

    • @C0LPAN1C
      @C0LPAN1C 2 หลายเดือนก่อน +2

      Physical and perimeter security is king.

  • @frankhabermann9083
    @frankhabermann9083 3 ปีที่แล้ว +190

    You can spoof Mac addresses. So if you unplug a Pi from the switch, you might just take the Mac of that Pi and the mac filter is irrelevant. This is an inconvenience for the attacker, but be careful not to overstate the gained security there. Mac addresses are often just written on devices, otherwise just plug it into your own switch and read the mac from there. Furthermore, in a real life scenario, you run in a huge problem if an attacker gains direct physical access to the switch, but I guess everyone is already aware of that ;)
    Overall nice content, thanks!

    • @rob7328
      @rob7328 3 ปีที่แล้ว +6

      sticky ports my friend

    • @KL-lt8rc
      @KL-lt8rc 3 ปีที่แล้ว +12

      @@rob7328 802.1x*

    • @2Fast4Mellow
      @2Fast4Mellow 3 ปีที่แล้ว +18

      Security is all about layers. Usually when a device is hard linked to a port it provides a certain service. Sure you can spoof the mac address, but for a network printer I can disable most networking. I only have to open certain ports and when you spoof the MAC address, you can only do things that the device could, but nothing more.
      I'm an old-school administrator. By default I block/deny everything and than I open up the things I need. It is not user friendly and when something needs to be connected, I takes some time (sometimes several hours) to setup everything. This concept is working for me for over 25 years going back to my Netware days.
      Given enough time, opportunity and resources everything can be hacked. If someone is specifically targeting you, there is usually very little you can do about that. But by securing your switch in a proper way, you can guard against 99% of the attacks out there...

    • @mathbee
      @mathbee 3 ปีที่แล้ว +2

      not to mention that in his example, the sharkjack has already cloned the MAC of the existing raspberry Pi. which makes his example terrible.

    • @Nailzy1985
      @Nailzy1985 3 ปีที่แล้ว +3

      @@mathbee It's not cloned. The last two digits of the MAC were indeed different. The Pi was d9, the sharkjack was a9.

  • @clevtrev96
    @clevtrev96 3 ปีที่แล้ว +50

    @14:03 If you’re gonna blur out your switch’s IP address, you should probably blur it out completely… ;)

    • @tnasty15
      @tnasty15 3 ปีที่แล้ว +6

      Wouldn’t you have to be connected locally to do anything with that IP?

    • @AngryMarkFPV
      @AngryMarkFPV 3 ปีที่แล้ว +5

      @@tnasty15 any insight into the internals of another network can be of use. especially being his core switch.

    • @tnasty15
      @tnasty15 3 ปีที่แล้ว +1

      @@AngryMarkFPV I definitely see it not being ideal but I believe even the DoD doesn’t label IP addresses as anything other than unclassified unless combined with subnet mask and maybe even something else.

    • @jolss0
      @jolss0 3 ปีที่แล้ว +7

      @@AngryMarkFPV Not really. It's a private IP address and without knowing the inside global address there's not much you can do with it. Even then there would have to be some NAT/PAT for that address as well. Which raises the question why he even blurred it to begin with.

    • @MonsiourPotatoHead
      @MonsiourPotatoHead 3 ปีที่แล้ว +1

      @@jolss0 its a best practice. @AngryMarkFPV said it the best, any insight to his network could be dangerous. We also don't know how often his network comes under attack, how much info somebody has collected etc.. Just better to blur it out.

  • @michielvandewijgaart8858
    @michielvandewijgaart8858 3 ปีที่แล้ว +6

    As a 35 plus years network admin I really like the way you present this topic. It’s making me enthousiastic about my job all over. Thanks for that!

    • @Deliquescentinsight
      @Deliquescentinsight 3 ปีที่แล้ว +1

      Try it at 63, jaded to the max...Chuck is inspiring I agree

  • @garystinson1060
    @garystinson1060 2 ปีที่แล้ว +64

    Hey Chuck, First.... I love your channel and your teaching style is superb! Second, When do you think EP 15 might be coming? I'm hungry for more !

  • @thiagodcano
    @thiagodcano ปีที่แล้ว

    Dude, there is no one, absolutely no one on youtube with better network related content. I do hope you are getting rich from it and thank you, thank you a lot

  • @NinjapcCSGO
    @NinjapcCSGO 3 ปีที่แล้ว +7

    I think you do a really good job when it comes to fast paced dictation, most people stumble over their thought processes or skip steps, you stayed on track the whole time while making it enjoyable to learn. I wish all IT channels were as entertaining and captivating as yourself when it comes to teaching new users. Keep up the good work sir, subbed.

  • @lastomocha
    @lastomocha 3 ปีที่แล้ว +27

    You're *REALLY* better than education channels. Thanks for information maan

  • @demandredlfc4180
    @demandredlfc4180 3 ปีที่แล้ว +4

    Port-security is for small installations only. As you mentioned in the end of the video, much better ways are 802.1X (or MAB for dumb devices). I am in the RADIUS database - I get access to a VLAN I am assigned to. I am not - I don't get access at all being dropped to quarantine VLAN. Simple, flexible and can be handled by a small number of engineers in a large network. Profiling by Cisco ISE/FortiNAC/etc. is a next-gen feature but a bit expensive.

    • @diablo4223
      @diablo4223 3 ปีที่แล้ว

      I work for a large company with many thousands of network devices, and we still use Port Security. Although not for security purposes per se, we mainly use it for stopping the usage of unmanaged switches on the network.

    • @demandredlfc4180
      @demandredlfc4180 3 ปีที่แล้ว

      @@diablo4223 we have about 600 switches. Why not to use single-host or multi-domain auth mode? They also limit the number of devices that can authorize on a single port.

  • @natedavis2559
    @natedavis2559 3 ปีที่แล้ว +1

    For future readers. NMAP is not an attack. NMAP is a type of active enumeration, and there are a lot of legitimate use cases for the usage of NMAP in network/system operations. Including debugging.

    • @diablo4223
      @diablo4223 3 ปีที่แล้ว

      I had originally thought this too. I suppose in the context of nmapping someone elses network unauthorized, it could be considered an attack, but I agree with you on this one.

  • @kayyumforu
    @kayyumforu ปีที่แล้ว +3

    Why have you left us in the middle of this CCNA journey! It's been 2 years we are still waiting for EP 15!!

    • @gag_singh
      @gag_singh ปีที่แล้ว +1

      not sure about EP15 or others, but his page has this playlist for the entire free ccna course: th-cam.com/play/PLIhvC56v63IJVXv0GJcl9vO5Z6znCVb1P.html

  • @sebastiannielsen525
    @sebastiannielsen525 3 ปีที่แล้ว +6

    Chuck, a good tip with working on multiple ports at once in cisco is interface range then you can put the range of ports you need to change and do it all with one command

  • @kenGPT
    @kenGPT 3 ปีที่แล้ว +69

    MAC's are easily cloned. Which is why you need to pair up port security with 802.1x machine certificates

    • @deadcatthinks6725
      @deadcatthinks6725 3 ปีที่แล้ว

      He mentions that at 21:19

    • @utiniposungu1221
      @utiniposungu1221 5 หลายเดือนก่อน +2

      Have you watched the whole video? He mentioned this...

  • @NetworkChuck
    @NetworkChuck  3 ปีที่แล้ว +61

    VIRTUALIZE your debit cards and protect your financial identity with Privacy: ntck.co/privacy
    Watch the whole course: bit.ly/nc-ccna
    Go deeper: ntck.co/ncccna
    🔥🔥Join the NetworkChuck Academy!: ntck.co/NCAcademy
    🔎🔎Can you complete the lab???: ntck.co/ncccna
    This is CCNA Episode 14. Port security is a VITAL thing we must learn when becoming network engineers, especially when you have hackers running around using things like the Shark Jack from HAK5. In this video, I’ll show you the best practices for securing your switch ports on Cisco Switches and Unifi (Ubiquiti) switches.
    🔥🔥Join the NetworkChuck membership: ntck.co/Premium
    **Sponsored by Boson Softwareth-cam.com/users/sgaming/emoji/7ff574f2/emoji_u1f525.png

    • @lus33r
      @lus33r 3 ปีที่แล้ว

      Yessss!!

    • @ShivanMahadeo
      @ShivanMahadeo 3 ปีที่แล้ว

      Thank you for posting!!!

    • @creepymcpeepers
      @creepymcpeepers 3 ปีที่แล้ว

      Goveaway

    • @desipher
      @desipher 3 ปีที่แล้ว

      Cool thank you and thanks for the educational videos!

    • @bliblabl8149
      @bliblabl8149 3 ปีที่แล้ว

      What if the attacker determines the MAC-Address from the allowed device, and sets the MAC-Adress to it's hacking device? MAC-Address can be changed I think. Is there any way to handle this?

  • @Aussie.Lassie
    @Aussie.Lassie ปีที่แล้ว +3

    I absolutely love everything about your content! Just how clean your explanations are and how much detail you go through using visual aid. As a visual learner, your videos are absolutely Paradise to me! Also, your comment about being in a black hole with no friends and you're sad reminds me of Loki when he says, "Yes, very sad...Anyway..." LOL!

  • @darrencoutts6227
    @darrencoutts6227 2 ปีที่แล้ว +6

    Would love to see more of this series. I have found it really interesting and really enjoy the way you present the information.

  • @NickBarrett
    @NickBarrett 3 ปีที่แล้ว +9

    Thank you for doing it this way! Learning how to do the stuff is one thing. But seeing what its like "being attacked" looks like and blocking the attack looks like!

  • @Еремен
    @Еремен ปีที่แล้ว

    You are such an underratedly effective teacher of this stuff

  • @cb49999
    @cb49999 3 ปีที่แล้ว +10

    This is all great info, your content is awesome! One thing I might add though: If you unplug the raspberry pi and plug it directly into the shark jack, the shark jack can clone the RPi's Mac address, which would allow the shark jack to bypass port security by providing the same Mac address as the legitimate raspberry pi.

  • @somethingungodly5786
    @somethingungodly5786 3 ปีที่แล้ว

    I'm 3 months into getting my bachelor's in cybersecurity. So glad I found your channel. You explain things very well and it helps me out. Thank you.

  • @picassoimpaler3243
    @picassoimpaler3243 3 ปีที่แล้ว +3

    Thank you for popping up in my feed today!
    I have been slacking off on studying and pushing my way into the IT universe after getting shot down after 4 rounds of interviews for my first IT job. But your videos do a great job of keeping me on focus and how fun it can be!
    Thank you much and I appreciate all your work on your channel!

  • @therobb5738
    @therobb5738 3 ปีที่แล้ว +2

    I'm currently in OS Software and computer hardware, and Networking, but security is next once I re-learn all the stuff I forgot in my 20's. Can't believe how much I still know and is actually still relevant some 10+ years down the line. Did port security and observation old-school for so many years, a keychain shark seems too easy. I want one!

  • @jw9410
    @jw9410 2 ปีที่แล้ว

    Natural born teacher. I love the way you teach. You make hard things look easy.

  • @razredge68
    @razredge68 3 ปีที่แล้ว +5

    Another cool thing you can use the Shark Jack for is making a rogue DHCP server. This is good for learning how to configure DHCP snooping and dynamic ARP inspection.

    • @xaero212
      @xaero212 3 ปีที่แล้ว

      any tutorial on that topic that you can share, please?

  • @mtnsolutions
    @mtnsolutions 2 ปีที่แล้ว

    Watched this the day you uploaded it and was baffled. Committed to studying CCNA in the meantime and I’m sponging what you’re spilling here. Thanks

  • @TheGarpttsr
    @TheGarpttsr 3 ปีที่แล้ว

    Chuck, A couple quick questions about the Shark Jack,
    1. Where dies it get its power? Is it PoE or does it have a battery?
    2. Could you have it grab MAC addresses connected? Like use a coupler, grab the mac(s) of a device/cable you are unplugging, then spoof that MAC via a script config?
    BTW: I love your videos, i have been digesting your whole channel and your way of teaching is similar to my own. It is obvious that you love and live what you do. Keep it up.

  • @franckygl
    @franckygl ปีที่แล้ว

    Thanks man, Cisco auto learning makes it soooo complicated to digest while your course is easy to follow and understand!

  • @RobertGomezN7
    @RobertGomezN7 3 ปีที่แล้ว +6

    "Put it in VLAN 666!"
    That comment has earned you my sub! Also, thank you for teaching this. Physical security is one of the things that I love seeing at the places I've worked (and hate when there is none). I've seen switches plugged into wall jacks that were left out in the open and since earning my BAS in IS&C, that is vexing!
    Also "swi po mac sticky" is a great command to run on cisco ports to ensure that no "new" devices get swapped for the one that is set for the port!

    • @ohlord1285
      @ohlord1285 3 ปีที่แล้ว

      but he didn`t name the vlan, im suffering..

  • @kens9124
    @kens9124 3 ปีที่แล้ว

    I have been doing networking for about 6 years, but never got a CCNA. Never thought I could do the cert. Your videos make me think I can. Thank you and keep doing the fine work you do

    • @chibudomeledu1941
      @chibudomeledu1941 10 หลายเดือนก่อน

      What did cert did you use to get your current job?

  • @josue6131
    @josue6131 3 ปีที่แล้ว

    I know like nothing talked about in any of your videos but I have amazing interest in cyber security and everything you talk about

    • @networkchucksupport1705
      @networkchucksupport1705 3 ปีที่แล้ว

      Contact our support team on Instagram @Networkchucksupport to join our tutorial classes

  • @mustfaal-hasanat1376
    @mustfaal-hasanat1376 3 ปีที่แล้ว +2

    Has this series finished ? It has been 4 months since the last video 😔😢
    Seriously .. you're the best instructor I've ever seen 🌹👍
    Hope you complete the series very soon 😊

  • @juliajv9009
    @juliajv9009 3 ปีที่แล้ว +9

    Thank you for the course! Will you proceed with it ? Will we get new EPs ?

  • @shashanksingh9427
    @shashanksingh9427 3 ปีที่แล้ว +16

    favorite dialog of chuck : Let,s hack youtube today ethically ,off course🔥🔥🔥🔥😂😂

  • @ballroomdancer2010
    @ballroomdancer2010 2 ปีที่แล้ว +12

    It's been about 6 months since the last CCNA video. When are we going to get more of this course? I love how you explain things. Without this course, I've been forced to go somewhere else to try to learn for my CCNA and it's not really working well for me. Please. We need more of this course.

    • @babyguitar1404
      @babyguitar1404 2 ปีที่แล้ว

      So the course is not complete?

    • @ballroomdancer2010
      @ballroomdancer2010 2 ปีที่แล้ว +2

      @@babyguitar1404 correct. There's a lot more we need to know for the ccna.

    • @leonstone3443
      @leonstone3443 11 หลายเดือนก่อน

      where have you gone to complete? im looking for a more up to date series

    • @ballroomdancer2010
      @ballroomdancer2010 11 หลายเดือนก่อน

      @@leonstone3443 doesn't look like Network Chuck is going to be completing this series. I went to CBT Nuggets.

  • @j7a1k1e
    @j7a1k1e 3 ปีที่แล้ว

    The shark jack generates a random MAC address on boot so restricting it's MAC wouldn't be helpful as it will be different next time you plug it in. There is also a way to connect it to a device that is on the network, determine the devices MAC and change its own to match. In effect, you can unplug a cable, plug the cable into the shark jack then unplug it and plug the shark jack into the network port. That bypasses all securities covered here.

  • @manny-
    @manny- 3 ปีที่แล้ว +39

    "Golden Snitch" What a fantastic name for a Switch!😂

  • @vng-alien
    @vng-alien 2 ปีที่แล้ว

    This video right here got me into the it "space" 1 year ago during covid, now im almost done with my A+ and going to start my linux+ soon. Love you chuck...

  • @BrashTV
    @BrashTV 5 หลายเดือนก่อน

    You're a king Chuck!

  • @jcbenge08
    @jcbenge08 3 ปีที่แล้ว

    I love this!! I have to work with customers all the time where I have to tell them, "I'm gonna send the ticket to the network team and tell them to do a shut/no-shut on the port." I had an *idea* of what was going on behind the scenes, but it's so stinking cool to see it play out on screen like this!!! Thank you so much for what you do!!!

  • @twinklingwater
    @twinklingwater 2 ปีที่แล้ว +1

    Reading the title I was expecting something about 802.1x. Well, too bad.
    One thing to mention, though: MAC-Filtering is easily subverted as the MAC address can be changed using standard tools. So if you happen to disconnect a device to use its port, just connect the device to your own machine. Wait a moment for the DHCP-request which will contain the device's MAC. Then use the gathered MAC address on your own hardware.
    Simple as that.

  • @JohnDoe-dj3xh
    @JohnDoe-dj3xh 3 ปีที่แล้ว

    here's how I protect my network ports: my switch is in a rack that is physically locked. you would need a key to the rack to even plug that in. the only cables running to outside the server will only issue an IP address to the device with the mac address corresponding to the device that should be plugged into it. honestly, to me, that is secure enough to prevent most attacks. sure you could find the computer's mac address and spoof it then disconnect the computer and attach the sharkjack to the cable with a little adapter, but that is honestly more trouble than its worth and requires prolonged uninterrupted access to my PC

  • @willhudgins
    @willhudgins 2 ปีที่แล้ว

    I need to configure port security on a Cisco switch this week and you just happen to have a quick tutorial. Perfect! Thank you.

  • @aashita6850
    @aashita6850 ปีที่แล้ว

    You explain everything so nicely. I have never understood this concept before you.

  • @flippinbutterr4403
    @flippinbutterr4403 3 ปีที่แล้ว +29

    Shark jack is pretty cool, can't wait for the rubber ducky vid tho 😁👍

  • @danielanderson9052
    @danielanderson9052 3 ปีที่แล้ว

    This is especially important for residential homes that have multiple Surveillance cameras outside house that can easily be knocked off to gain network access. Best practice dictates having multiple cameras recording other cameras in case they get vandalized.

  • @mctomspdo
    @mctomspdo 3 ปีที่แล้ว

    Since we barely change anything in our office, and everything is labels, and the Server room does allow this:
    All the non used Ethernet plugs are just not connected to anything. The connection on the patch pannels are emtpy, only the ones with a Device normally being on the plug are actually connected in the Server room

  • @lordcarnorjax8599
    @lordcarnorjax8599 3 ปีที่แล้ว

    One thing Chuck forget to mention, how to clear the sticky MAC address. Use the command "no switchport port-security mac-address sticky [mac-address]". Also if you're using "switchport port-security mac-address sticky" make sure you shutdown any unused ports on the switch or black hole / quarantine them. Quarantine works better, especially if the network cabling labelling is poor, because it still learns the MAC and then you just change the VLAN & label the port. Otherwise the first person to plug something in, maybe nefarious, will just be allowed on the network. While this topic covers basics of port security, it's only using MAC addresses for security which can be spoofed. This is a great learning concept but as shown has limited uses in a real environment. If you want proper port security & secure Wi-Fi, 802.1x with certificates is the only way to go and that's very large and technically deep topic especially when you throw Cisco ISE in the mix. ISE is a beast thats a course all on it's own.

  • @thomasnelson9804
    @thomasnelson9804 3 ปีที่แล้ว +2

    Loving this free CCNA course you've been doing. The way you talk about it you can tell your passionate and it makes it much easier to watch. Will you be doing a video on configuring IP addressing for data center's/offices?

  • @joejohn5398
    @joejohn5398 7 หลายเดือนก่อน

    I believe that’s how a bank near me got robbed about 5-7 years ago. Guy plugged into an open phone jack and hacked the security system and on a holiday they went in and nobody knew until they returned for work.

  • @RedAzukiCake
    @RedAzukiCake 3 ปีที่แล้ว

    If someone has physical access to your network, it's trivial to unplug a device, look at the MAC address on the label of the device and spoof it in the interface settings of the attacker's device. Port Isolation and ACLs is the correct way to secure a switchport.

  • @simondian6380
    @simondian6380 2 ปีที่แล้ว +1

    Hey Team!
    I've noticed this is the last episode of the series and there's more.
    Love these episodes as I'm looking to take my CCNA.
    Thank you!!

  • @Mikeyy1985
    @Mikeyy1985 3 ปีที่แล้ว +1

    Chuck, I don't know how you do it but I've been going to school for IT for about 2 years now and every time i start a new class you cover something about that subject. Thanks for your guidance you make some of the subjects easier to understand!

  • @j.r._7416
    @j.r._7416 3 ปีที่แล้ว +2

    Nice flex on your Cisco skills. Loving this content! Thanks for putting this together. Cisco VLANS next??

  • @ThexAlien
    @ThexAlien 3 ปีที่แล้ว

    I personally didn't learn anything new, but this was a good episode. I've never heard blackhole VLAN, everyone I've met in the industry for me personally has called it a quarantine VLAN. Port security is very important, thank you for sharing with everyone!

  • @Nathan15038
    @Nathan15038 11 หลายเดือนก่อน

    I'm glad that you give use the run down and course for free so at lest we have some knowledge of how to secure a port

  • @freakdude162002
    @freakdude162002 3 ปีที่แล้ว +2

    you did port isolation on the Unifi switch but on the Cisco switch to do port isolation you could have done "switchport protected" as well

  • @talbizle
    @talbizle 2 ปีที่แล้ว +1

    I..need..more..NetworkChuck..CCNA!

  • @joebywan
    @joebywan 3 ปีที่แล้ว +1

    With the situation you mentioned having someone unplug your existing device and plug in theirs is defeated just by them plugging the device into theirs, harvesting the other mac address & then modifying theirs to match it before connecting to the switch.

    • @j.kaimori3848
      @j.kaimori3848 3 ปีที่แล้ว

      Hypothetically then you need the device password that you plugged into.

    • @joebywan
      @joebywan 3 ปีที่แล้ว +2

      @@j.kaimori3848 not to do a basic arp request

  • @dreuwmaddocks1118
    @dreuwmaddocks1118 2 ปีที่แล้ว

    Network Chuck, you absolute BEAST OF AN ENGINEER.........!!!!!😌😌😌😌

  • @roomwithmoose4160
    @roomwithmoose4160 3 ปีที่แล้ว +5

    You make cyber security so fun, both red/blue team perspectives

  • @timo_schwich
    @timo_schwich 3 ปีที่แล้ว

    Easily install a nac like arp-guard, macmon, … and let them keep your network secure. Much more easier

  • @deakon-rl9wi
    @deakon-rl9wi 2 ปีที่แล้ว

    I had old port servers from like 1998 that were Linksys that I went through and learned alot!! Especially after I revamped them on today's newer 5G network back in 2012 when I was re mapping digital security infrastructure and tracking finances.

  • @robwideman2534
    @robwideman2534 3 ปีที่แล้ว

    I was thinking... he hasn't talked about VLANs yet but he is going to talk about Dot1x? nah, just port security. Very good for the folks just getting started.

  • @vaishalivg
    @vaishalivg 3 ปีที่แล้ว +7

    That's it with the CCNA? Or some more later? Plssss make a Udemy course on CCNA CCNP - the whole topics .. u teach na.. it's so nice to have a teacher like this 🔥🔥

    • @marcorz9549
      @marcorz9549 2 ปีที่แล้ว

      Next video is called: What is an ip address? Ep 1

  • @SB-qm5wg
    @SB-qm5wg 3 ปีที่แล้ว

    That's a whole lotta work if you work for a big company. vlans, firewalls, nat, with planning is the way to go. Especially if you work with places that require _change windows_

  • @JonasErixon89
    @JonasErixon89 3 ปีที่แล้ว +2

    Great video! Exited for more videos in this course! When will more videos in this course come out? ;-) Cant wait

  • @MichaelMichael-kv4gp
    @MichaelMichael-kv4gp 3 ปีที่แล้ว +1

    If someone with a shark jack is at your switch and you have turned off all unused ports..... just unplug something in use and bam problem solved. Becky in accounting will complain for 5 min that she lost internet then go on a coffee break while you do your thing.

  • @Meatball.
    @Meatball. 3 ปีที่แล้ว +1

    Dude i love ur vids, from a tutorial stand point and just watching to learn topics or just enjoy to
    them.

    • @networkchucksupport1705
      @networkchucksupport1705 3 ปีที่แล้ว

      You can message our support team on Instagram @Networkchucksupport if you are interested in learning more

  • @lorxsbot2399
    @lorxsbot2399 หลายเดือนก่อน

    is there going to be an ep 15 ever? I'm guessing not as there its been 3 years haha. I would love more of the course if you can do more please! You are the only person I find engaging and fun to learn from. I learn way more in 10 mins with you than reading or watching someones else's 15 hours of boringness

    • @TheMenockerShow
      @TheMenockerShow 19 วันที่ผ่านมา

      The episodes that go into subnetting are still a part of this series, they're just broken up into their own series because it's a whole subject.

    • @lorxsbot2399
      @lorxsbot2399 19 วันที่ผ่านมา

      @ oh okay. I actually watched those first a few months ago haha. Thank you

  • @ricorodriguez3579
    @ricorodriguez3579 3 ปีที่แล้ว +16

    What happened to the rest of the course?

  • @Kevin-cw8of
    @Kevin-cw8of 3 ปีที่แล้ว +1

    Chuck is our IT Santa

  • @fordonmekochgalenskaper5665
    @fordonmekochgalenskaper5665 3 ปีที่แล้ว +2

    This was really interesting, parts of this I used for years, other things I had little knowledge about but you explained those things in a level that I understand. I not work with it, just an nerdy hobbyist.
    With your videos I have to rebuild my home network and play with the security stuff 🙂
    Keep up the good work

  • @Dumpstermuffin1
    @Dumpstermuffin1 ปีที่แล้ว

    I've seen so many CCNA youtube videos in which a boring guy gives a lecture in a monotone voice. Network Chuck on the other hand makes his videos so entertaining

  • @noelwilson5253
    @noelwilson5253 3 ปีที่แล้ว +1

    more ccna i been waiting the longest

  • @iiN1GH7M4R3ii
    @iiN1GH7M4R3ii 2 ปีที่แล้ว

    what a kick ass series man thank you so much for these! looking forward to the next video!

  • @ericmaher4756
    @ericmaher4756 3 ปีที่แล้ว +2

    Thanks for recording these vids in double speed, which allow me to play them at 4X 🤣. Jokes aside, I like your enthusiasm about tech, and how you’re excited to share what you know. Now lemme grab a coffee before I finish this episode!

  • @yosefGames
    @yosefGames 3 ปีที่แล้ว +2

    In principle a security detail is intended to prevent an acre's access through a switch that he is trying to infiltrate an organization or something pretty good security detail but there are still methods that an acre can bypass the security detail

    • @ChrisBenjamins
      @ChrisBenjamins ปีที่แล้ว

      First thing that came to my mind is via MAC Spoofing/cloning.

  • @C0mmander
    @C0mmander 3 ปีที่แล้ว +1

    You could readout the macid of the device you unplug and then spoof it on your device that you plug in.

  • @bgdogy
    @bgdogy 3 ปีที่แล้ว

    With sticky mode, if you don't write the config, a reboot erases the learned MAC and you can plug any device in. Also good practice to give your VLANs a description, especially when doing very large networks.

  • @LiEnby
    @LiEnby 2 ปีที่แล้ว

    My immediate thought- you could create a device that you can plug a network cable into, it *does network stuff* and logs the mac address, then you can plug it into the port on your switch, and it will report that mac address to your network, thus bypassing the security
    about 801.x, i wonder if you can just plug that device into your own network, and capture the password it sends, or maybe perform a man-in-the-middle attack, *in hardware* where it logs in automatically. then you just send whatever you want after that haha

  • @parthsarathi6948
    @parthsarathi6948 2 ปีที่แล้ว

    Hi Chuck , I'm a huge fan and get very excited whenever your video comes

  • @monkeyspanksback
    @monkeyspanksback 3 ปีที่แล้ว

    Quick tip. Use the command int range fa0/10-13 to add those ports to vlan 666 in one shot

  • @johngartrell9714
    @johngartrell9714 2 ปีที่แล้ว

    Looking forward to the next episode. Glad your brother will be helping out now!

  • @jmr
    @jmr 3 ปีที่แล้ว +10

    Makes me want a good switch for my home network.

    • @ethanedwards8296
      @ethanedwards8296 3 ปีที่แล้ว +1

      I bought a C3750 for cheap on EBay, amazing switch, would recommend.

    • @jmr
      @jmr 3 ปีที่แล้ว

      @@ethanedwards8296 That's a lot more then I need but it makes me smile just looking at it. Thanks for the recommendation I may just buy one.

    • @Ryan78900
      @Ryan78900 3 ปีที่แล้ว

      @@jmr haha :)

  • @JeandrePetzer
    @JeandrePetzer 3 ปีที่แล้ว +4

    This is actually a really great series :D Already done CCNA but the refresher doesnt do any harm - even learnt a few new stuff! Eagerly awaiting the rest of the episodes

    • @Ryan78900
      @Ryan78900 3 ปีที่แล้ว

      you and me both buddy. Wanna hangout and discuss notes

    • @scottluebke5012
      @scottluebke5012 3 ปีที่แล้ว +1

      Same. Got the CCNA and studied arse off for it, but these trainings are super helpful. Studying a cert really doesn't bring these things home.

  • @fosres
    @fosres 2 ปีที่แล้ว

    Awesome video. Setting up a VLAN can later help a network admin to setup a VPN to your business infrastructure.

  • @ardentdfender4116
    @ardentdfender4116 2 ปีที่แล้ว +1

    It’s been several months since we last had a Free CCNA course uploaded with this one being the last in that series. Are we getting any more Chuck?

  • @vaishalivg
    @vaishalivg 3 ปีที่แล้ว +1

    Thank u so much chuck ❤️, will this CCNA course continues? How many more episodes are there?

  • @feiwoza
    @feiwoza 2 ปีที่แล้ว

    Awesome learning CCNA. Lets continue. Thanks for privacy and port security.

  • @andreasfrank5568
    @andreasfrank5568 3 ปีที่แล้ว

    In an enterprise environment i would prefer RADIUS authentication, verifying the user/and or the certificate of the enterprise computer.
    And i would rather have it default to a Guest VLAN limited to specific applications/ports but with internet access so the user is able to contact IT-support.
    As others have mentioned MAC-spoofing is quite easy to workaround but limiting devices on your port to 1-2 is definitely good practice.

    • @KL-lt8rc
      @KL-lt8rc 3 ปีที่แล้ว

      Yes, that is the more modern and accepted solution. 'Port security' is pretty out of date by this point, and not going to stop much. But it's still a good topic to cover for beginners.

  • @tresorclito2662
    @tresorclito2662 3 ปีที่แล้ว

    Bro now I’m a networkchuck junkie because of you😂😂😂😂

  • @PigMan9080
    @PigMan9080 3 ปีที่แล้ว +1

    Have been using 802.1x wired security

  • @_antoniocouto
    @_antoniocouto 3 ปีที่แล้ว +1

    You should have a list with all your CCNA videos.

  • @stvnseegal
    @stvnseegal 3 ปีที่แล้ว

    I NEED to decide what I want right now and stop being told what I need to do

  • @anshumishra9368
    @anshumishra9368 3 ปีที่แล้ว

    Chuck your giveaways make's us a dedicated hard working person cause it includes lots of work to participate .....😅

  • @JustinEakes
    @JustinEakes 2 ปีที่แล้ว

    Hey Network Chuck, I hope you can start working on this course again. This course is extremely valuable!!!

  • @babyzworld9061
    @babyzworld9061 ปีที่แล้ว +2

    when is next episode coming shirrrrrrrr!

  • @secinject814
    @secinject814 3 ปีที่แล้ว

    I ordered a Shark Jack recently and I'm super stoked to test it out on some ethical plugs, look pretty awesome.