The switchport port-security command must be entered with no additional options to enable port security for the port. SWA(config-if)# switchport port-security mac-address stickyĮxplanation: The default mode for a port security violation is to shut down the port so the switchport port-security violation command is not necessary.SWA(config-if)# switchport port-security violation restrict SWA(config-if)# switchport port-security maximum 2 SWA(config-if)# switchport port-security mac-address sticky SWA(config-if)# switchport port-security.The switch should automatically detect the MAC address of the IP phone and the PC and add those addresses to the running configuration. If a different device is connected, port Fa0/2 is shut down. No one is allowed to disconnect the IP phone or the PC and connect some other wired device. Which switch configuration would be most appropriate for port Fa0/2 if the network administrator has the following goals? Port Fa0/2 has already been configured appropriately. The authentication server, which performs the actual authenticationġ0.The authenticator, which is the switch that the client is connecting to and that is actually controlling physical network access.The supplicant, which is the client that is requesting network access.Explanation: The devices involved in the 802.1X authentication process are as follows:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |