Write out a config to permit only the below MAC address
to pass traffic through a port on your switch.
in another way writhe a confrigation which permit only mac
address trfaic through a port of your switch
Answers were Sorted based on User's Feedback
Using port security feature of Cisco switch, we can fix a
particular mac add for a fix port.
Switch(config-if)#switchport port-security maximum 1
Switch(config-if)#switchport port-security mac-address
0005.1b00.5b58
Switch(config-if)#switchport port-security violation
shutdown
[SwitchA] (Port no 0/1)
!
!
!
!
!
[PC] (0005.1b00.5b58)
Suppose u hv one switch (ie Switch A). On that,port number
fa 0/1 is connected to PC Which is having mac address
0005.1b00.5b58 . Now u want to allow the mac address of
this PC (0005.1b00.5b58), can only access throgh this port
ie fa 0/1. If any other device attach to this port it will
not work. That means security violation occuring here. So
we also protect this by configuring
"switchport port-security violation shutdown" command.
Hope JITU, this may help u to understand this topic. Give
ur feedback.
| Is This Answer Correct ? | 5 Yes | 0 No |
Answer / jitu
actualy question is that
Write out a config to permit only the below MAC address
to pass traffic through a port on your switch.
mac-address 0005.1b00.5b58
i am extremly soory for type mistake
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / jitendera kuaar sinha
i canot give my feed back becoz i donot know abou that it
is wright or not.for time being unttill anther feed back is
come i suppose that it is a correct answer
| Is This Answer Correct ? | 0 Yes | 0 No |
What is hsrp?
Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)
Which protocol supenetting is enable by default?
Select the physical interfaces that PPP can be configured on a Cisco router: A. Asynchronous serial B. HSSI C. ISDN D. Synchronous serial
How many maximum paths you can give on latest ios in rip?
What is the Broadcast MAC Address?
Identify the OSI layer associated with bits? A.) Physical B.) Network C.) Binary D.) Data link
The Internet Control Message Protocol occurs at what layer of the seven layer model? A.) Physical B.) Transport C.) Session D.) Datalink E.) Presentation F.) Network
What are the disadvantages of symmetric algorithms?
HOW MPLS IS DIFFERENT FROM OSPF? WHY NOW A DAYS MPLS IS PREFERED OVER ANY NETWORK PROTOCOL?
Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Processed sequentially from bottom to top C.) Processed sequentially from top to bottom D.) If a packet is denied it would be tested against the remaining statements in the access-list E.) Once a match is made the packet is either denied or permitted F.) Enabled on all interfaces by default
Which protocol works at the Internet layer and is responsible for making routing decisions? A.) UDP B.) IP C.) TCP D.) ARP