Write out a config to permit only the below MAC address
to pass traffic through a port on your switch.

in another way writhe a confrigation which permit only mac
address trfaic through a port of your switch

Answers were Sorted based on User's Feedback



Write out a config to permit only the below MAC address to pass traffic through a port on your swit..

Answer / shahin

Using port security feature of Cisco switch, we can fix a
particular mac add for a fix port.

Switch(config-if)#switchport port-security maximum 1
Switch(config-if)#switchport port-security mac-address
0005.1b00.5b58
Switch(config-if)#switchport port-security violation
shutdown


[SwitchA] (Port no 0/1)
!
!
!
!
!
[PC] (0005.1b00.5b58)

Suppose u hv one switch (ie Switch A). On that,port number
fa 0/1 is connected to PC Which is having mac address
0005.1b00.5b58 . Now u want to allow the mac address of
this PC (0005.1b00.5b58), can only access throgh this port
ie fa 0/1. If any other device attach to this port it will
not work. That means security violation occuring here. So
we also protect this by configuring

"switchport port-security violation shutdown" command.


Hope JITU, this may help u to understand this topic. Give
ur feedback.

Is This Answer Correct ?    5 Yes 0 No

Write out a config to permit only the below MAC address to pass traffic through a port on your swit..

Answer / jitu

actualy question is that

Write out a config to permit only the below MAC address
to pass traffic through a port on your switch.

mac-address 0005.1b00.5b58

i am extremly soory for type mistake

Is This Answer Correct ?    0 Yes 0 No

Write out a config to permit only the below MAC address to pass traffic through a port on your swit..

Answer / jitendera kuaar sinha

i canot give my feed back becoz i donot know abou that it
is wright or not.for time being unttill anther feed back is
come i suppose that it is a correct answer

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which command enables directly connected network 199.55.72.0 to be used by RIP? A. Router(config router)# rip 199.55.0.0 B. Router(config router)# rip 199.55.72.0 C. Router(config router)# network 199.55.0.0 D. Router(config router)# network 199.55.72.0

1 Answers  


hi friend i am stuck in the big problem.this problem is regading pix firewall. i have a cisco pix 515e firewall inmy company.now when i configure it and after rebooting it the ACT link never getup.when i apply clear config all comand the ACT link get up after oveservation i see that there is fauilover problem when i apply failover active ACT link agin get up is there any way to get my firewall in standby mode rember that there is only on firewall within my n/w i am lookig towards all of you jitendera kumar sinha

0 Answers  


Explain on which interface we always apply access-list?

0 Answers  


Inverse ARP serves what purpose? A.) Method for a local router to introduce itself to the remote end of the connection B.) Broadcast a routing table update C.) Identify MAC addresses if the IP address is known D.) Sent every 10 seconds used to verify the Frame Switch is still active

1 Answers  


What are the 3 ways routers learn paths to destination networks? A.) Dynamic B.) Static C.) Routing tables D.) Default

1 Answers  






What does the Frame Relay switch use to distinguish between each PVC connection? A. data-link connection identifiers (DLCIs) B. BECNs C. FECNs D. the Local Management Interface (LMI)

2 Answers  


what's the difference between Symmetric and Asymmetric cryptosystem?

0 Answers   CCIE,


What is the protocol and what is the purpose of the following address? 238 255 255 255 A. IPX a SAP broadcast B. IP a multicast group C. IP a reserved address D. IP a directed broadcast E. IPX a flooded broadcast

3 Answers  


Can you explain encapsulating, carrier and passenger protocol?

0 Answers   CCIE,


Identify 3 ways in which a router can be configured? A.) TFTP B.) Nvram C.) Ping D.) Console E.) Trace

2 Answers  


Which layer is responsible for determining if sufficient resources for the intended communication exists? A.) Application B.) Network C.) Session D.) Presentation E.) Transport

3 Answers  


Which IP packet field will prevent endless loops? type-of-service identificationf lags time-to-live header checksum

1 Answers  


Categories