Unit Exam 1 Answer Key-DATA COMMUNICATIONS
Unit Exam 1 Answer Key-DATA COMMUNICATIONS
Unit Exam 1 Answer Key-DATA COMMUNICATIONS
II. Introduction:
By default, all interfaces on a Cisco switch are turned on. That means that
an attacker could connect to your network through a wall socket and
potentially threaten your network. If you know which devices will be
connected to which ports, you can use the Cisco security feature called port
security. By using port security, a network administrator can associate
specific MAC addresses with the interface, which can prevent an attacker to
connect his device. This way you can restrict access to an interface so that
only the authorized devices can use it. If an unauthorized device is
connected, you can decide what action the switch will take, for example
discarding the traffic and shutting down the port.
1. define what action the switch will take when receiving a frame from an
unauthorized device by using the port security violation {protect | restrict |
shutdown} interface subcommand. All three options discard the traffic from
the unauthorized device. The restrict and shutdown options send a log
message when a violation occurs. Shut down mode also shuts down the
port.
2. define the maximum number of MAC addresses that can be used on the
port by using the switchport port-security maximum NUMBER interface sub
mode command
The following example shows the configuration of port security on a Cisco
switch:
First, we need to enable port security and define which MAC addresses are
allowed to send frames:
Next, by using the show port-security interface fa0/1 we can see that the
switch has learned the MAC address of host A:
III. Instruction:
We need to discover PC1’s MAC address. We can get this information from
the PC itself or from the switch. Use ‘ipconfig /all’ to find it on the PC.
You need to make the interface an access port before the switch will
accept Port Security configuration. No VLANs are configured on the switch
or specified in the lab task so leave it in the default VLAN 1.
SW1(config)#int f0/1
SW1(config-if)#switch mode access
SW1(config-if)#switchport port-security
SW1(config-if)#switchport port-security maximum 2
SW1(config-if)#switchport port-security mac-address0000.1111.1111
SW1(config)#int f0/2
SW1(config-if)#switch mode access
SW1(config-if)#switchport port-security
4) Use a ‘show port-security’ command to verify the MAC address on PC2.
You may have to ping from PC2 first to generate some traffic.
VI. Introduction: