Write out a config to permit only the below MAC address
to pass traffic through a port on your switch.
in another way writhe a confrigation which permit only mac
address trfaic through a port of your switch
Answers were Sorted based on User's Feedback
Using port security feature of Cisco switch, we can fix a
particular mac add for a fix port.
Switch(config-if)#switchport port-security maximum 1
Switch(config-if)#switchport port-security mac-address
0005.1b00.5b58
Switch(config-if)#switchport port-security violation
shutdown
[SwitchA] (Port no 0/1)
!
!
!
!
!
[PC] (0005.1b00.5b58)
Suppose u hv one switch (ie Switch A). On that,port number
fa 0/1 is connected to PC Which is having mac address
0005.1b00.5b58 . Now u want to allow the mac address of
this PC (0005.1b00.5b58), can only access throgh this port
ie fa 0/1. If any other device attach to this port it will
not work. That means security violation occuring here. So
we also protect this by configuring
"switchport port-security violation shutdown" command.
Hope JITU, this may help u to understand this topic. Give
ur feedback.
| Is This Answer Correct ? | 5 Yes | 0 No |
Answer / jitu
actualy question is that
Write out a config to permit only the below MAC address
to pass traffic through a port on your switch.
mac-address 0005.1b00.5b58
i am extremly soory for type mistake
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / jitendera kuaar sinha
i canot give my feed back becoz i donot know abou that it
is wright or not.for time being unttill anther feed back is
come i suppose that it is a correct answer
| Is This Answer Correct ? | 0 Yes | 0 No |
Can you explain L2TP?
What is the distance limitation for 100BaseT? A. 305.955 ft B. 7283.46 inches C. 184 Meters D. 185 Kilometers
Select the fields for the Cisco HDLC protocol: A. Flag, Address, Control B. Flag, Address, Control, Protocol, LCP (Code, Identifier, Length, Data), FCS, Flag C. Flag, Address, Control, Data, FCS, Flag D. Flag, Address, Control, Proprietary, Data, FCS, Flag
I received a call from client that network is down. We have 100 or 1000 of switches and routers so how could we find the client switch and its port number? and useful commands to find this ?
Identify the 2 rules used when configuring a Distance Vector routing protocol? A.) Physically connected network(s) B.) Configure the classfull address, no subnets C.) Enable CDP so neighbors can be detected D.) Same autonomous network
Identify the length of an IPX address and it's components? A.) 80 bits, 48 bits network and 32 bits node B.) 32 bits, 16 bits network and 16 bits node C.) None of the above D.) 80 bits, 32 bits network and 48 bits node
What do we check while configuring the server?
What is BGP attribute & How many types of attributes are used by BGP???
5 Answers Hathway, HCL, Infinite Computer Solutions,
What cable called v.35?
What is hsrp?
Which defined peer ip address an local subnet belong to crete?
The following is partial output from a routing table ; '192.168.10.0 [100/1300] via 10.1.0.1, 00:00:23, Ethernet1' Which routing protocol is being used? (assuming defaults have not been changed) A.) OSPF B.) RIP C.) BGP D.) IGRP