Best Practices for Switch Deployment at Customer Locations
Purpose This document provides a standardized checklist and deployment procedure for network switches installed at customer sites. The goal is to ensure secure, stable, and consistent switch configurations across all customer environments, minimizing configuration gaps and improving network reliability.
Scope This procedure applies to all managed switch deployments (Layer 2 / Layer 3) performed by the network implementation or field engineering team at customer premises. It covers post-installation configuration and verification steps for both access and distribution layer switches.
Home > Enterprise security devices or applications > Best Practices for Switch Deployment at Customer Locations
Prerequisites
Before starting switch configuration, ensure:
- Power and physical network connectivity are verified.
- Switch is running the approved firmware version.
- Access to the switch console or management IP is available.
- Network design document and IP plan are reviewed.
Configuration Steps
Configure Management Interface and Gateway
Assign the switch management interface (e.g., VLAN interface) a static IP as per the customer’s IP plan.
interface vlan <Mgmt_VLAN_ID> ip address <Mgmt_IP> <Subnet_Mask> ip default-gateway <Mgmt_GW_IP>
Ensure connectivity to the NOC or management system via ping or traceroute.
Note: Avoid using VLAN 1 as the management VLAN to prevent potential security risks and traffic leaks.
Set Strong Administrative Passwords
Configure a strong local admin password:
username admin password <Complex_Password>
Note: Enforce password complexity as per organization policy (minimum 8–12 characters, mix of upper/lowercase, numbers, and symbols).
Apply Access Control Lists (ACLs) for Management Access
Restrict SSH/Telnet management to authorized IP ranges only:
ip access-list standard MGMT_ACCESS permit <Authorized_MGMT_Subnet> deny any line vty 0 4 access-class MGMT_ACCESS in transport input ssh Disable Telnet if not required: line vty 0 4 transport input ssh
Configure Spanning Tree Protocol (STP) Consistently
Verify STP mode (RSTP/MSTP) matches across all switches in the site. Set appropriate STP priorities for root and secondary switches:
spanning-tree vlan <VLAN_ID> priority 4096 Root spanning-tree vlan <VLAN_ID> priority 8192 Secondary
Enable Port Security (If Applicable)
Limit the number of MAC addresses on access ports:
interface <access-port> switchport mode access switchport port-security switchport port-security maximum 2 switchport port-security violation restrict
Enable Storm Control (If Needed)
Protect against broadcast/multicast/unicast flooding:
interface <port> storm-control broadcast level 5.00 storm-control multicast level 5.00 storm-control action shutdown
Verify LACP Status
Ensure all configured LACP interfaces are in participant/active mode:
show lacp interface
Resolve any mismatched or suspended ports.
Disable Unused Ports
Identify and shut down unused ports:
interface range <ports> shutdown description UNUSED_PORT
Optionally, assign them to an isolated VLAN (e.g., VLAN 999).
Configure Jumbo MTU (If Required)
For environments requiring large frame transmission (e.g., storage or virtualization):
system mtu 9216
Reboot if necessary for changes to take effect.
Set Date, Time, and NTP Configuration
Configure timezone and NTP servers:
clock timezone IST 5 30 ntp server <NTP_IP> prefer
Verify synchronization:
show ntp status
Configure Syslog
Forward logs to customer or central syslog server:
logging host <Syslog_Server_IP> logging trap informational
Verify logging functionality.
Enable SNMP or NMS Monitoring
Configure SNMP for monitoring if required:
snmp-server community <Community_String> ro snmp-server host <NMS_IP> version 2c <Community_String>
Verify reachability from the NMS platform.
Backup Configuration
Save and export switch configuration after deployment:
write memory copy running-config tftp:<Server_IP>/<Switch_Name>_config.cfg
Store backups in the project documentation.
Firmware and Configuration Baseline
Ensure switch runs on the approved/stable firmware version.
→ Outdated firmware may cause security vulnerabilities or protocol mismatches.
Save default configuration before changes for rollback or audit purposes.
Hostname and Device Naming Convention
Set a meaningful hostname following the standard naming scheme (e.g., SITE-FLR-SW01). This helps identify the device easily in monitoring tools and logs.
Banner and Login Message
Configure a login banner for legal and security compliance:
banner motd Unauthorized access is prohibited
VLAN and Trunk Configuration Validation
Ensure all VLANs are created as per design.
Check trunk ports for allowed VLANs:
show interfaces trunk
Loop Protection / BPDU Guard
Enable BPDU Guard or Root Guard on access ports to prevent accidental loops:
spanning-tree portfast bpduguard enable
Temperature and Hardware Health Check
Validate fan status, temperature, and power supply health before handover:
show environment
Interface Description and Documentation
Add clear descriptions on each interface for traceability:
interface Gi1/0/1 description Uplink_to_Core_SW01
Post-Deployment Handover
- Submit configuration backup to project documentation.
- Update asset register with management IP, hostname, and location details.
- Inform NOC/Monitoring team for inclusion in monitoring system.
Conclusion
Following these deployment best practices ensures secure, consistent, and reliable switch configurations at customer sites. Proper management access, security controls, monitoring, and backups help maintain network stability and simplify ongoing maintenance.
Home > Enterprise security devices or applications > Best Practices for Switch Deployment at Customer Locations