question archive What are the steps involved to configure port security? How do we see a security violation?  

What are the steps involved to configure port security? How do we see a security violation?  

Subject:Computer SciencePrice:2.86 Bought5

What are the steps involved to configure port security? How do we see a security violation?

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

Steps involved to configure port security

-Defining the interface as an access interface. This is done using the switchport mode access interface subcommand

-Enabling port security. This done using the switchport port-security interface command

-Defining which MAC addresses are permitted to send frames through this interface

 

Additional optional steps

-Defining what the switch should do if it receives a frame from a device that is not allowed

-Defining the number of MAC addresses allowed to use the port

 

How do we see a security violation?

To see the port security logs and status, we issue the 'show port-security' command. In the event of a security violation, the port sends logs of these violations which can be seen. These are the types of responses by ports to security violations; protect, restrict or shutdown

Related Questions