question archive What are the steps involved to configure port security? How do we see a security violation?
Subject:Computer SciencePrice:2.86 Bought5
What are the steps involved to configure port security? How do we see a security violation?
Steps involved to configure port security
-Defining the interface as an access interface. This is done using the switchport mode access interface subcommand
-Enabling port security. This done using the switchport port-security interface command
-Defining which MAC addresses are permitted to send frames through this interface
Additional optional steps
-Defining what the switch should do if it receives a frame from a device that is not allowed
-Defining the number of MAC addresses allowed to use the port
How do we see a security violation?
To see the port security logs and status, we issue the 'show port-security' command. In the event of a security violation, the port sends logs of these violations which can be seen. These are the types of responses by ports to security violations; protect, restrict or shutdown