asebocorner.blogg.se

Switchport port security mac address example
Switchport port security mac address example









switchport port security mac address example

%SYS-5-CONFIG_I: Configured from console by console SW1(config-if)# switchport port-security violation protect SW1(config-if)# switchport port-security mac sticky To configure the interface to sticky the MAC address dynamically learn use the switchport port-security mac sticky command in interface configuration mode as discussed at the beginning of this lab.Įnter configuration commands, one per line. To enable port-security you’ll execute the switchport port-security command as previously learned in Lab 4-19. Upon a port security violation, protect the port. – Enable port-security on SW1’s Fa0/1 interface and configure the interface to sticky the MAC address learned. However, this lab can be completed using the Stub Lab.

Switchport port security mac address example free#

This command is executed in privileged mode to erase the current secure mac-address table for a specified switch port.ĭue to the limited feature support of the NM-16ESW, this lab CANNOT be completed using the Free CCNA Workbook GNS3 topology. This command is executed in interface configuration mode and configures the port to dynamically learn the MAC address and automatically configure the MAC address as a static MAC address associated with the port.Ĭlear port-security all interface interfacename#/# Switchport port-security mac-address sticky This command is executed in interface configuration mode and statically sets a MAC address that allows traffic with the source MAC to traverse the switch. Switchport port-security mac-address h.h.h In this lab you will familiarize yourself with the following new commands Command When port-security is configured this way, the first MAC address learned on the switch port will be automatically statically configured into the running-configuration as if you manually specified the MAC address. The next way which is more convenient is to configure a “ Sticky” MAC address and leave the max MAC addresses to its default value of one. The first way being that you configure a static MAC address when configuring port-security on a specific interface. There are two ways to configure a sticky port. In this case you can sticky the port that the wan router is connected to preventing unauthorized device swaps like such. For example you have a small site location with a 1841 router and a 3560-8pc switch and an end user gets the bright idea to swap the 1841 with a WRT54G because he wants wireless and wired network connectivity. If you completed the previous lab Configuring Dynamic Switchport Security than you’ll be pretty much up to speed in this lab.ĭynamic port security is great but what about when you connect switches to routers or other devices that need to be secured in a way to prevent unauthorized device swapping in the network.











Switchport port security mac address example