{"id":20,"date":"2026-05-01T17:35:29","date_gmt":"2026-05-01T15:35:29","guid":{"rendered":"http:\/\/192.168.20.20\/?p=20"},"modified":"2026-05-02T14:06:58","modified_gmt":"2026-05-02T12:06:58","slug":"fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco","status":"publish","type":"post","link":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\/","title":{"rendered":"Fiche Initialisation et s\u00e9curisation des interfaces sur un switch Cisco"},"content":{"rendered":"\n<p>Dans un contexte BTS CIEL ou SIO, la configuration des interfaces d\u2019un switch est une comp\u00e9tence fondamentale.<br>Elle permet non seulement d\u2019assurer la connectivit\u00e9, mais surtout de <strong>s\u00e9curiser l\u2019acc\u00e8s au r\u00e9seau<\/strong> (\u00e9viter les branchements sauvages, limiter les attaques type MAC flooding, etc.).<\/p>\n\n\n\n<p>Cette fiche montre une <strong>configuration propre, r\u00e9aliste et directement exploitable<\/strong> en environnement p\u00e9dagogique ou pro.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"http:\/\/192.168.20.20\/wp-content\/uploads\/2026\/05\/image-2-1024x683.png\" alt=\"\" class=\"wp-image-21\" srcset=\"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/image-2-1024x683.png 1024w, https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/image-2-300x200.png 300w, https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/image-2-768x512.png 768w, https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/image-2.png 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Configuration compl\u00e8te <\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>enable\nconfigure terminal\n\n! ==============================\n! NOM DU SWITCH\n! ==============================\nhostname S1\n\n! ==============================\n! CONFIGURATION DES INTERFACES UTILISATEURS\n! ==============================\ninterface range fastEthernet 0\/1 - 24\n\n description PORT_UTILISATEUR\n switchport mode access\n switchport access vlan 10\n\n ! D\u00e9sactivation du DTP (\u00e9vite n\u00e9gociation automatique)\n switchport nonegotiate\n\n ! Activation Port Security\n switchport port-security\n switchport port-security maximum 2\n switchport port-security violation restrict\n switchport port-security mac-address sticky\n\n ! Protection contre attaques STP\n spanning-tree portfast\n spanning-tree bpduguard enable\n\n ! Activation de l'interface\n no shutdown\n\nexit\n\n! ==============================\n! DESACTIVATION DES PORTS INUTILISES\n! ==============================\ninterface range fastEthernet 0\/25 - 48\n\n description PORT_INUTILISE\n shutdown\n\nexit\n\n! ==============================\n! CONFIGURATION INTERFACE DE MANAGEMENT\n! ==============================\ninterface vlan 99\n ip address 192.168.99.2 255.255.255.0\n no shutdown\n\nexit\n\n! ==============================\n! PASSERELLE PAR DEFAUT\n! ==============================\nip default-gateway 192.168.99.1\n\n! ==============================\n! SECURISATION GLOBALE\n! ==============================\nservice password-encryption\n\n! ==============================\n! SAUVEGARDE\n! ==============================\nend\nwrite memory<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83e\udde0 Explication d\u00e9taill\u00e9e<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">\ud83d\udd39 1. Nom du switch<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>hostname S1<\/code><br>Permet d\u2019identifier clairement l\u2019\u00e9quipement (important en supervision, logs, SSH).<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">\ud83d\udd39 2. Configuration des ports utilisateurs<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>interface range fastEthernet 0\/1 - 24<\/code><br>On configure plusieurs ports d\u2019un coup \u2192 <strong>gain de temps + coh\u00e9rence<\/strong><\/li>\n\n\n\n<li><code>switchport mode access<\/code><br>Force le port en mode acc\u00e8s \u2192 <strong>\u00e9vite les trunks non voulus<\/strong><\/li>\n\n\n\n<li><code>switchport access vlan 10<\/code><br>Segmentation r\u00e9seau \u2192 isolation logique des machines<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">\ud83d\udd39 3. S\u00e9curisation des ports<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>switchport nonegotiate<\/code><br>D\u00e9sactive DTP \u2192 emp\u00eache un attaquant de forcer un trunk<\/li>\n\n\n\n<li><code>switchport port-security<\/code><br>Active la s\u00e9curit\u00e9 MAC<\/li>\n\n\n\n<li><code>maximum 2<\/code><br>Autorise 2 \u00e9quipements max (PC + t\u00e9l\u00e9phone IP par exemple)<\/li>\n\n\n\n<li><code>violation restrict<\/code><br>Bloque les trames suspectes sans couper le port (mode discret)<\/li>\n\n\n\n<li><code>mac-address sticky<\/code><br> Apprend automatiquement les MAC autoris\u00e9es<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">\ud83d\udd39 4. Protection contre attaques r\u00e9seau<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>spanning-tree portfast<\/code><br>Acc\u00e9l\u00e8re la mise en service du port (poste utilisateur)<\/li>\n\n\n\n<li><code>spanning-tree bpduguard enable<\/code><br>Coupe le port si un switch est branch\u00e9 \u2192 <strong>anti attaque STP<\/strong><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">\ud83d\udd39 5. Ports inutilis\u00e9s<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>shutdown<\/code><br><strong>R\u00e8gle de base en cybers\u00e9curit\u00e9 : tout ce qui n\u2019est pas utilis\u00e9 = d\u00e9sactiv\u00e9<\/strong><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">\ud83d\udd39 6. Interface de management<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>interface vlan 99<\/code><br>Permet d\u2019administrer le switch via IP<\/li>\n\n\n\n<li>Bonne pratique :\n<ul class=\"wp-block-list\">\n<li>VLAN d\u00e9di\u00e9 (pas VLAN 1)<\/li>\n\n\n\n<li>isol\u00e9 du r\u00e9seau utilisateur<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">\ud83d\udd39 7. Passerelle<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>ip default-gateway<\/code><br>Permet l\u2019acc\u00e8s distant (SSH, ping, supervision)<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">\ud83d\udd39 8. S\u00e9curisation globale<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>service password-encryption<\/code><br> \u00c9vite les mots de passe en clair dans la config<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Dans un contexte BTS CIEL ou SIO, la configuration des interfaces d\u2019un switch est une comp\u00e9tence fondamentale.Elle permet non seulement d\u2019assurer la connectivit\u00e9, mais surtout de s\u00e9curiser l\u2019acc\u00e8s au r\u00e9seau (\u00e9viter les branchements sauvages, limiter les attaques type MAC flooding, etc.). Cette fiche montre une configuration propre, r\u00e9aliste et directement exploitable en environnement p\u00e9dagogique ou [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4,10],"tags":[3],"class_list":["post-20","post","type-post","status-publish","format-standard","hentry","category-cisco","category-reseau","tag-cisco"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fiche Initialisation et s\u00e9curisation des interfaces sur un switch Cisco - Eryann Breizh SecOps<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fiche Initialisation et s\u00e9curisation des interfaces sur un switch Cisco - Eryann Breizh SecOps\" \/>\n<meta property=\"og:description\" content=\"Dans un contexte BTS CIEL ou SIO, la configuration des interfaces d\u2019un switch est une comp\u00e9tence fondamentale.Elle permet non seulement d\u2019assurer la connectivit\u00e9, mais surtout de s\u00e9curiser l\u2019acc\u00e8s au r\u00e9seau (\u00e9viter les branchements sauvages, limiter les attaques type MAC flooding, etc.). Cette fiche montre une configuration propre, r\u00e9aliste et directement exploitable en environnement p\u00e9dagogique ou [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\/\" \/>\n<meta property=\"og:site_name\" content=\"Eryann Breizh SecOps\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-01T15:35:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-02T12:06:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/image-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"wpadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wpadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\\\/\"},\"author\":{\"name\":\"wpadmin\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/person\\\/d2ee98d2385cd045ed4fe1c07ca320b5\"},\"headline\":\"Fiche Initialisation et s\u00e9curisation des interfaces sur un switch Cisco\",\"datePublished\":\"2026-05-01T15:35:29+00:00\",\"dateModified\":\"2026-05-02T12:06:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\\\/\"},\"wordCount\":269,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/192.168.20.20\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/image-2-1024x683.png\",\"keywords\":[\"cisco\"],\"articleSection\":[\"Cisco\",\"R\u00e9seau\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\\\/\",\"url\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\\\/\",\"name\":\"Fiche Initialisation et s\u00e9curisation des interfaces sur un switch Cisco - Eryann Breizh SecOps\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/192.168.20.20\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/image-2-1024x683.png\",\"datePublished\":\"2026-05-01T15:35:29+00:00\",\"dateModified\":\"2026-05-02T12:06:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\\\/#primaryimage\",\"url\":\"http:\\\/\\\/192.168.20.20\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/image-2-1024x683.png\",\"contentUrl\":\"http:\\\/\\\/192.168.20.20\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/image-2-1024x683.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/eryann.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fiche Initialisation et s\u00e9curisation des interfaces sur un switch Cisco\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#website\",\"url\":\"https:\\\/\\\/eryann.fr\\\/\",\"name\":\"Eryann Breizh SecOps\",\"description\":\"Fiches techniques &amp; labs en syst\u00e8mes et r\u00e9seaux poor les \u00e9tudiants en BTS CEIL ET SIO\",\"publisher\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eryann.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\",\"name\":\"Breizh Sec Ops\",\"url\":\"https:\\\/\\\/eryann.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/eryann.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png\",\"contentUrl\":\"https:\\\/\\\/eryann.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png\",\"width\":1246,\"height\":229,\"caption\":\"Breizh Sec Ops\"},\"image\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/person\\\/d2ee98d2385cd045ed4fe1c07ca320b5\",\"name\":\"wpadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"caption\":\"wpadmin\"},\"sameAs\":[\"https:\\\/\\\/eryann.fr\"],\"url\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/author\\\/wpadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fiche Initialisation et s\u00e9curisation des interfaces sur un switch Cisco - Eryann Breizh SecOps","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\/","og_locale":"fr_FR","og_type":"article","og_title":"Fiche Initialisation et s\u00e9curisation des interfaces sur un switch Cisco - Eryann Breizh SecOps","og_description":"Dans un contexte BTS CIEL ou SIO, la configuration des interfaces d\u2019un switch est une comp\u00e9tence fondamentale.Elle permet non seulement d\u2019assurer la connectivit\u00e9, mais surtout de s\u00e9curiser l\u2019acc\u00e8s au r\u00e9seau (\u00e9viter les branchements sauvages, limiter les attaques type MAC flooding, etc.). Cette fiche montre une configuration propre, r\u00e9aliste et directement exploitable en environnement p\u00e9dagogique ou [&hellip;]","og_url":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\/","og_site_name":"Eryann Breizh SecOps","article_published_time":"2026-05-01T15:35:29+00:00","article_modified_time":"2026-05-02T12:06:58+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/image-2.png","type":"image\/png"}],"author":"wpadmin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wpadmin","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\/#article","isPartOf":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\/"},"author":{"name":"wpadmin","@id":"https:\/\/eryann.fr\/#\/schema\/person\/d2ee98d2385cd045ed4fe1c07ca320b5"},"headline":"Fiche Initialisation et s\u00e9curisation des interfaces sur un switch Cisco","datePublished":"2026-05-01T15:35:29+00:00","dateModified":"2026-05-02T12:06:58+00:00","mainEntityOfPage":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\/"},"wordCount":269,"commentCount":0,"publisher":{"@id":"https:\/\/eryann.fr\/#organization"},"image":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\/#primaryimage"},"thumbnailUrl":"http:\/\/192.168.20.20\/wp-content\/uploads\/2026\/05\/image-2-1024x683.png","keywords":["cisco"],"articleSection":["Cisco","R\u00e9seau"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\/","url":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\/","name":"Fiche Initialisation et s\u00e9curisation des interfaces sur un switch Cisco - Eryann Breizh SecOps","isPartOf":{"@id":"https:\/\/eryann.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\/#primaryimage"},"image":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\/#primaryimage"},"thumbnailUrl":"http:\/\/192.168.20.20\/wp-content\/uploads\/2026\/05\/image-2-1024x683.png","datePublished":"2026-05-01T15:35:29+00:00","dateModified":"2026-05-02T12:06:58+00:00","breadcrumb":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\/#primaryimage","url":"http:\/\/192.168.20.20\/wp-content\/uploads\/2026\/05\/image-2-1024x683.png","contentUrl":"http:\/\/192.168.20.20\/wp-content\/uploads\/2026\/05\/image-2-1024x683.png"},{"@type":"BreadcrumbList","@id":"https:\/\/eryann.fr\/index.php\/cisco\/fiche-initialisation-et-securisation-des-interfaces-sur-un-switch-cisco\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/eryann.fr\/"},{"@type":"ListItem","position":2,"name":"Fiche Initialisation et s\u00e9curisation des interfaces sur un switch Cisco"}]},{"@type":"WebSite","@id":"https:\/\/eryann.fr\/#website","url":"https:\/\/eryann.fr\/","name":"Eryann Breizh SecOps","description":"Fiches techniques &amp; labs en syst\u00e8mes et r\u00e9seaux poor les \u00e9tudiants en BTS CEIL ET SIO","publisher":{"@id":"https:\/\/eryann.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eryann.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/eryann.fr\/#organization","name":"Breizh Sec Ops","url":"https:\/\/eryann.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/eryann.fr\/#\/schema\/logo\/image\/","url":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png","contentUrl":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png","width":1246,"height":229,"caption":"Breizh Sec Ops"},"image":{"@id":"https:\/\/eryann.fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/eryann.fr\/#\/schema\/person\/d2ee98d2385cd045ed4fe1c07ca320b5","name":"wpadmin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","caption":"wpadmin"},"sameAs":["https:\/\/eryann.fr"],"url":"https:\/\/eryann.fr\/index.php\/author\/wpadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/20","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/comments?post=20"}],"version-history":[{"count":1,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/20\/revisions"}],"predecessor-version":[{"id":22,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/20\/revisions\/22"}],"wp:attachment":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/media?parent=20"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/categories?post=20"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/tags?post=20"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}