ed by a start-up company to implement some port security configurations on the newly acquired switch on their network. They want you to restrict access on the switch only to authorised devices. Below is the start-up network overview: A hub (Hub-PT Hub0) is placed in the director’s office and connected to the switch (2960-24TT Switch 0). Another hub (Hub-PT Hub1) is placed in the developers’ lab and it is connected to the switch (2960-24TT Switch 0) as well. The switch

LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
5th Edition
ISBN:9781337569798
Author:ECKERT
Publisher:ECKERT
Chapter12: Network Configuration
Section: Chapter Questions
Problem 12RQ
icon
Related questions
Question

Switch ports security is a serious security concern to computer networks. As a network specialist
consultant, you have been approached by a start-up company to implement some port security
configurations on the newly acquired switch on their network. They want you to restrict access on
the switch only to authorised devices. Below is the start-up network overview:
A hub (Hub-PT Hub0) is placed in the director’s office and connected to the switch (2960-24TT
Switch 0). Another hub (Hub-PT Hub1) is placed in the developers’ lab and it is connected to
the switch (2960-24TT Switch 0) as well. The switch Switch0 enables hosts on the network
to access data on the server Server0.

Configuration of Switch0 Fa0/1 port:
a. Enable port security on Switch0 Fa0/1 port.
b. Configure Switch0 Fa0/1 port to dynamically learn the MAC address of the end
device that is currently connected to it.
c. Enable (define) the Switch0 to be able to learn a maximum of 1 host on its Fa0/1
port.
d. If an unauthorised device attempts to send frames on the network through Switch0
Fa0/1, configure the switch to automatically shut down the port.
e. Show a summary of the commands used to achieve the above configurations.

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Network Protocols
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:
9781337569798
Author:
ECKERT
Publisher:
CENGAGE L
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning