202k views
1 vote
You are configuring a switch that has three hosts attached to FastEthernet 0/2 through 0/4. All three hosts are part of a public kiosk display that allows guests to access the Internet. You would like to implement port security to prevent guests from removing Ethernet cables from the hosts and connecting them to the Ethernet ports on their personal laptops. If guests attempt to connect through their personal laptops, you would like the switch to drop the frames.

Complete the following tasks:

a.Configure FastEthernet 0/2 through 0/4 as access ports.
b.On the FastEthernet 0/2 through 0/4, configure port security to learn and retain the MAC addresses of the connected hosts.
c.Configure the port security violation as protect on each applicable interface.
Save your changes to the startup-config file.
d.The switch is currently configured with the default port security settings. Use the show run command to verify the configurations.

User Out
by
3.2k points

1 Answer

4 votes

Answer:

Port security and violation mode.

Step-by-step explanation:

A switch is a layer two device of the OSI model. It is used to transmit frames between nodes within a network. It transfers frames by discovering the destination Mac address and saving it to its address table, and sending the frame to the egest port to the destination.

The port security command is used to specify the Mac addresses that are recognised by a port. There are three types of port security, they are, dynamic, static and sticky Mac addresses that can configured on an interface.

The security violation command is used to decide what happens to a port when it detects an unfamiliar Mac address. The three security violation modes are protect, restrict and shutdown. It is used as an interface command alongside the port security command.

User Mackenir
by
2.8k points