5.2.2.7 Packet Tracer Configuring Switch Port Security Instructions

5.2.2.7%20Packet%20Tracer%20-%20Configuring%20Switch%20Port%20Security%20Instructions

User Manual: Pdf

Open the PDF directly: View PDF PDF.
Page Count: 2

Download5.2.2.7 Packet Tracer - Configuring Switch Port Security Instructions
Open PDF In BrowserView PDF
Packet Tracer - Configuring Switch Port Security
Topology

Addressing Table
Device

Interface

IP Address

Subnet Mask

S1

VLAN 1

10.10.10.2

255.255.255.0

PC1

NIC

10.10.10.10

255.255.255.0

PC2

NIC

10.10.10.11

255.255.255.0

Rogue Laptop

NIC

10.10.10.12

255.255.255.0

Objective
Part 1: Configure Port Security
Part 2: Verify Port Security

Background
In this activity, you will configure and verify port security on a switch. Port security allows you to restrict a
port’s ingress traffic by limiting the MAC addresses that are allowed to send traffic into the port.

Part 1: Configure Port Security
a. Access the command line for S1 and enable port security on Fast Ethernet ports 0/1 and 0/2.
b. Set the maximum so that only one device can access the Fast Ethernet ports 0/1 and 0/2.
c.

Secure the ports so that the MAC address of a device is dynamically learned and added to the running
configuration.

d. Set the violation so that the Fast Ethernet ports 0/1 and 0/2 are not disabled when a violation occurs, but
packets are dropped from an unknown source.
e. Disable all the remaining unused ports. Hint: Use the range keyword to apply this configuration to all the
ports simultaneously.

© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.

Page 1 of 2

Packet Tracer - Configuring Switch Port Security

Part 2: Verify Port Security
a. From PC1, ping PC2.
b. Verify port security is enabled and the MAC addresses of PC1 and PC2 were added to the running
configuration.
c.

Attach Rogue Laptop to any unused switch port and notice that the link lights are red.

d. Enable the port and verify that Rogue Laptop can ping PC1 and PC2. After verification, shut down the
port connected to Rogue Laptop.
e. Disconnect PC2 and connect Rogue Laptop to PC2’s port. Verify that Rogue Laptop is unable to ping
PC1.
f.

Display the port security violations for the port Rogue Laptop is connected to.

g. Disconnect Rouge Laptop and reconnect PC2. Verify PC2 can ping PC1.
h. Why is PC2 able to ping PC1, but the Rouge Laptop is not?

© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.

Page 2 of 2



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : Yes
Tagged PDF                      : Yes
Signing Date                    : 2013:07:31 10:54:50-07:00
Signing Authority               : ARE Acrobat Product v8.0 P23 0002337
Document Usage Rights           : FullSave
Annotation Usage Rights         : Create, Delete, Modify, Copy, Import, Export
Form Usage Rights               : Add, FillIn, Delete, SubmitStandalone
Signature Usage Rights          : Modify
XMP Toolkit                     : Adobe XMP Core 4.0-c316 44.253921, Sun Oct 01 2006 17:14:39
Create Date                     : 2013:07:31 10:52:58-07:00
Creator Tool                    : Microsoft® Word 2010
Modify Date                     : 2013:07:31 10:54:50-07:00
Metadata Date                   : 2013:07:31 10:54:50-07:00
Format                          : application/pdf
Creator                         : Betty Staerk
Producer                        : Microsoft® Word 2010
Document ID                     : uuid:842b29e6-a6ed-44c1-a2c6-ad1655d7e00c
Instance ID                     : uuid:60b5272c-cf74-4465-a176-0fd3ae379abe
Has XFA                         : Yes
Page Count                      : 2
Language                        : en-US
Author                          : Betty Staerk
EXIF Metadata provided by EXIF.tools

Navigation menu