CIS204_2

.docx

School

ECPI University, Greensboro *

*We aren’t endorsed by this school

Course

204

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

4

Uploaded by corada5995

Report
CIS204 2.1 – Port Security Corey Adams, Jorge Cortes, Stephen Harlow, Christopher Lee 1. What are the steps involved to configure port security? SUMMARY STEPS 1.    configure terminal 2.    interface interface-id 3.    switchport mode {access | trunk} 4.    switchport voice vlan vlan-id 5.    switchport port-security 6.    switchport port-security [maximum value [vlan {vlan-list | {access | voice}}]] 7.    switchport port-security violation {protect | restrict | shutdown | shutdown vlan} 8.    switchport port-security [mac-address mac-address [vlan {vlan-id | {access | voice}}] 9.    switchport port-security mac-address sticky 10.    switchport port-security mac-address sticky [mac-address | vlan {vlan-id | {access | voice}}] 11.    end 12.    show port-security 13.    copy running-config startup-config 2. How do we see a security violation? show port-security - This command displays port security information about all the interfaces on switch.
CIS204 2.1 – Port Security Corey Adams, Jorge Cortes, Stephen Harlow, Christopher Lee 3. What are the different port security violation modes? Choose one of these modes and explain how it works. 1. Protect —when the number of secure MAC addresses reaches the maximum limit allowed on the port, packets with unknown source addresses are dropped until you remove enough secure MAC addresses to drop below the maximum value or increase the number of maximum allowable addresses. You are not notified that a security violation has occurred. 2. Restrict —when the number of secure MAC addresses reaches the maximum limit allowed on the port, packets with unknown source addresses are dropped until you remove enough secure MAC addresses to drop below the maximum value or increase the number of maximum allowable addresses. In this mode, you are notified that a security violation has occurred. An SNMP trap is sent, a syslog message is logged, and the violation counter increments. 3. Shutdown —a port security violation causes the interface to become error-disabled and to shut down immediately, and the port LED turns off. When a secure port is in the error- disabled state, you can bring it out of this state by entering the err disable recovery secure-violation global configuration command, or you can manually re-enable it by entering the shutdown and no shut down interface configuration commands. This is the default mode.
CIS204 2.1 – Port Security Corey Adams, Jorge Cortes, Stephen Harlow, Christopher Lee 4. Using the drawing, configure port security on Switch1 to only allow PC0 on FA0/1. Choose a security violation as well. Share your commands. Switch1#  configure terminal Switch1(config)#  interface fa0/1 Switch1(config-if)#  switchport mode access Switch1(config-if)#  switchport port-security Switch1(config-if)#  switchport port-security maximum 1 Switch1(config-if)#  switchport port-security mac-address 0060:2F35:6102  Switch1(config-if)#  switchport port-security violation restrict 5. Using the drawing, configure port security on Switch2 on FA0/20 to “sticky learn” the MAC-address. Choose a security violation as well. Share your commands. Switch2#  configure terminal Switch2(config)#  interface fa0/20 Switch2(config-if)#  switchport mode access Switch2(config-if)#  switchport port-security Switch2(config-if)#  switchport port-security maximum 1 Switch2(config-if)#  switchport port-security mac-address sticky Switch2(config-if)#  switchport port-security violation restrict
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
CIS204 2.1 – Port Security Corey Adams, Jorge Cortes, Stephen Harlow, Christopher Lee 6. Using the drawing, how can we configure port security on Switch1 to not allow more than three devices on Switch2? Choose a security violation as well.  Share your commands. Switch#  configure terminal Switch(config)#  interface g0/1 Switch(config-if)#  switchport mode access Switch(config-if)#  switchport port-security Switch(config-if)#  switchport port-security maximum 3 Switch(config-if)#  switchport port-security mac-address sticky Switch(config-if)#  switchport port-security violation restrict References Switchport Port Security Explained With Examples . (2018, August). Retrieved from ComputerNetworkingNotes: https://www.computernetworkingnotes.com/ccna-study- guide/switchport-port-security-explained-with-examples.html