Write out a config to permit only the below MAC address
to pass traffic through a port on your switch.
in another way writhe a confrigation which permit only mac
address trfaic through a port of your switch
Answers were Sorted based on User's Feedback
Using port security feature of Cisco switch, we can fix a
particular mac add for a fix port.
Switch(config-if)#switchport port-security maximum 1
Switch(config-if)#switchport port-security mac-address
0005.1b00.5b58
Switch(config-if)#switchport port-security violation
shutdown
[SwitchA] (Port no 0/1)
!
!
!
!
!
[PC] (0005.1b00.5b58)
Suppose u hv one switch (ie Switch A). On that,port number
fa 0/1 is connected to PC Which is having mac address
0005.1b00.5b58 . Now u want to allow the mac address of
this PC (0005.1b00.5b58), can only access throgh this port
ie fa 0/1. If any other device attach to this port it will
not work. That means security violation occuring here. So
we also protect this by configuring
"switchport port-security violation shutdown" command.
Hope JITU, this may help u to understand this topic. Give
ur feedback.
| Is This Answer Correct ? | 5 Yes | 0 No |
Answer / jitu
actualy question is that
Write out a config to permit only the below MAC address
to pass traffic through a port on your switch.
mac-address 0005.1b00.5b58
i am extremly soory for type mistake
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / jitendera kuaar sinha
i canot give my feed back becoz i donot know abou that it
is wright or not.for time being unttill anther feed back is
come i suppose that it is a correct answer
| Is This Answer Correct ? | 0 Yes | 0 No |
What is a characteristic of Store and Forward switches? A.) They work at wire speed. B.) They are the same as Cut-Through switching in 'prune' mode. C.) They forward based on transport layer info. D.) They forward the frame before it is completely read. E.) They increase latency.
Identify 3 characteristics of a connection oriented protocol? A.) Path determination B.) Flow control C.) Acknowledgements D.) Uses hop count as metric E.) 3 step handshake
which layer is responsible for flow control with sliding windows and reliability with sequence number and acknowledgement? A)Transport. B)Application C) Internet D)Network Interface
Which IP packet field will prevent endless loops? type-of-service identificationf lags time-to-live header checksum
A default route is analogous to a _________. A. default gateway B. static route C. dynamic route D. one-way route
IPX traffic using different encapsulation types can go over the same data link A. true B. false
From Enable mode, a user types the letter 'C' and presses enter. There is more than 1 command that starts with 'C'. What message would the router return? A.) Nothing would be returned, the command is simply ignored. B.) unknown command C.) ambiguous command. D.) Copy to? E.) Configured console from console.
Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to identify a host device E.) Contains a network portion and a host portion
In IPSec what is SAD, SPD and SA's?
Identify IPX SAP and it's purpose? A.) Sonet Access Pipe - interface to Sonet ring B.) Service Advertising Protocol - advertise services C.) Server Appletalk Protocol - appletalk directory services D.) Service Access Point - identify upper layer protocols
Which of the following would be displayed by the command 'SHOW CDP NEIGHBOR DETAIL'? A.) The incoming/outgoing port. B.) The hardware platform. C.) One address per protocol. D.) Amount of Flash Memory Available E.) The routers hostname. F.) The subnet mask, if IP is configured.
Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Processed sequentially from bottom to top C.) Processed sequentially from top to bottom D.) If a packet is denied it would be tested against the remaining statements in the access-list E.) Once a match is made the packet is either denied or permitted F.) Enabled on all interfaces by default