CIS204 2.1

docx

School

ECPI University, Virginia Beach *

*We aren’t endorsed by this school

Course

204

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

2

Uploaded by MateMoonMoose29

Report
Maya Robinson CIS204 2.1 What are the steps involved to configure port security? How do we see a security violation? According to the textbook, there are six steps to configuring port security: 1. Interface the switch through static access or trunk interface. 2. Enable port security on the interface “switchport port-security” 3. One option when enabling port security is to set the number of MAC addresses allowed on that interface. 4. Set a security violation subcommand, when a security violation occurs. 5. There is also an option to associate a specific MAC address to that particular interface. 6. Another option is too use the “switchport port-security mac-address sticky” command. This will allow the first MAC address to be learned by that interface. What are the different port security violation modes? Choose one of these modes and explain how it works. Ther three violation modes are: protect, restrict, and shutdown. For shutdown mode, this stops any traffic or frame forwarding on that interface. Using the drawing, configure port security on Switch1 to only allow PC0 on FA0/1. Choose a security violation as well. Share your commands. These are the commands I would use to enable port security on port Fa0/1 Enable Configure Terminal Interface Fa0/1 Switchport Mode Access Switchport port-security mac-address (***insert desired MAC addresss***) Switchport port-security violation shutdown Using the drawing, configure port security on Switch2 on FA0/20 to “sticky learn” the MAC-address. Choose a security violation as well. Share your commands. These are the commands I would use to enable port security on port Fa0/1 Enable Configure Terminal Interface Fa0/20
Maya Robinson CIS204 2.1 Switchport Mode Access Switchport port-security mac-address sticky Switchport port-security violation shutdown Using the drawing, how can we configure port security on Switch1 to not allow more than three devices on Switch2? Choose a security violation as well. Share your commands. These are the commands I would use to achieve the above outcome. Enable Configure Terminal Interface G0/1 Switchport Mode Trunk Switchport port-security maximum 4 This will allow a maximum of three MAC addresses on that interface, the fourth being the actual switch.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help