![]() ![]() Why is PC2 able to ping PC1, but the Rouge Laptop is not? ![]() Disconnect Rouge Laptop and reconnect PC2. Display the port security violations for the port Rogue Laptop is connected to. Verify that Rogue Laptop is unable to ping PC1.į. Disconnect PC2 and connect Rogue Laptop to PC2’s port. After verification, shut down the port connected to Rogue Laptop.Į. Enable the port and verify that Rogue Laptop can ping PC1 and PC2. Attach Rogue Laptop to any unused switch port and notice that the link lights are red.ĭ. ![]() Verify port security is enabled and the MAC addresses of PC1 and PC2 were added to the running configuration.Ĭ. ![]() Hint: Use the range keyword to apply this configuration to all the ports simultaneously. Set the violation so that the Fast Ethernet ports 0/1 and 0/2 are not disabled when a violation occurs, but packets are dropped from an unknown source.Į. Secure the ports so that the MAC address of a device is dynamically learned and added to the running configuration.ĭ. Set the maximum so that only one device can access the Fast Ethernet ports 0/1 and 0/2.Ĭ. Access the command line for S1 and enable port security on Fast Ethernet ports 0/1 and 0/2.ī. Port security allows you to restrict a port’s ingress traffic by limiting the MAC addresses that are allowed to send traffic into the port. In this activity, you will configure and verify port security on a switch. Packet Tracer – Configuring Switch Port Security Addressing Table ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |