Submit Search
Upload
2.2.4.9 packet tracer configuring switch port security instructions - ig
•
0 likes
•
3,190 views
Alex Ramirez
Follow
cisco, packet tracer
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 2
Download now
Download to read offline
Recommended
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
Irsandi Hasan
How to configure port security in cisco switch
How to configure port security in cisco switch
IT Tech
55784943 practicas-ospf
55784943 practicas-ospf
YAMID FERREIRA MORA
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
Irsandi Hasan
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
Irsandi Hasan
Ospf.ppt
Ospf.ppt
Edgardo Scrimaglia
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
Irsandi Hasan
Router commands
Router commands
Akshay Bhardwaj
Recommended
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
Irsandi Hasan
How to configure port security in cisco switch
How to configure port security in cisco switch
IT Tech
55784943 practicas-ospf
55784943 practicas-ospf
YAMID FERREIRA MORA
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
Irsandi Hasan
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
Irsandi Hasan
Ospf.ppt
Ospf.ppt
Edgardo Scrimaglia
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
Irsandi Hasan
Router commands
Router commands
Akshay Bhardwaj
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer)
Arz Sy
Ccna rse dynamic routing
Ccna rse dynamic routing
newbie2019
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
Irsandi Hasan
EtherChannel Configuration
EtherChannel Configuration
NetProtocol Xpert
CCNA
CCNA
Abhishek Parihari
PPP (Point to Point Protocol)
PPP (Point to Point Protocol)
Ali Jafar
Vlan lab
Vlan lab
tmim8
Ether Channel High Speed Data Transmission
Ether Channel High Speed Data Transmission
Netwax Lab
Cisco CCNA- DHCP Server
Cisco CCNA- DHCP Server
Hamed Moghaddam
Chapter 3 link aggregation
Chapter 3 link aggregation
Josue Wuezo
CCNA PPT
CCNA PPT
Reetesh Gupta
Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1
Mukesh Chinta
Configuration of lan in cisco packet tracer by TAnjilur Rahman
Configuration of lan in cisco packet tracer by TAnjilur Rahman
TanjilurRahman6
Bluetooth protocol stack
Bluetooth protocol stack
stuimrozsm
6.5.1.2 packet tracer layer 2 security instructor
6.5.1.2 packet tracer layer 2 security instructor
Salem Trabelsi
Spanning tree protocol
Spanning tree protocol
Muhammad Arshad
OSI Layers
OSI Layers
Kishore Kumar
Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)
newbie2019
Network LACP/Bonding/Teaming with Mikrotik
Network LACP/Bonding/Teaming with Mikrotik
GLC Networks
Ccna PPT
Ccna PPT
AIRTEL
Security Concerns in LANs.pptx
Security Concerns in LANs.pptx
joko
Activy tecnologi and instructions
Activy tecnologi and instructions
perhimpunan mahasiswa bone "ARUMPONE" Politeknik negeri ujung pandang
More Related Content
What's hot
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer)
Arz Sy
Ccna rse dynamic routing
Ccna rse dynamic routing
newbie2019
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
Irsandi Hasan
EtherChannel Configuration
EtherChannel Configuration
NetProtocol Xpert
CCNA
CCNA
Abhishek Parihari
PPP (Point to Point Protocol)
PPP (Point to Point Protocol)
Ali Jafar
Vlan lab
Vlan lab
tmim8
Ether Channel High Speed Data Transmission
Ether Channel High Speed Data Transmission
Netwax Lab
Cisco CCNA- DHCP Server
Cisco CCNA- DHCP Server
Hamed Moghaddam
Chapter 3 link aggregation
Chapter 3 link aggregation
Josue Wuezo
CCNA PPT
CCNA PPT
Reetesh Gupta
Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1
Mukesh Chinta
Configuration of lan in cisco packet tracer by TAnjilur Rahman
Configuration of lan in cisco packet tracer by TAnjilur Rahman
TanjilurRahman6
Bluetooth protocol stack
Bluetooth protocol stack
stuimrozsm
6.5.1.2 packet tracer layer 2 security instructor
6.5.1.2 packet tracer layer 2 security instructor
Salem Trabelsi
Spanning tree protocol
Spanning tree protocol
Muhammad Arshad
OSI Layers
OSI Layers
Kishore Kumar
Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)
newbie2019
Network LACP/Bonding/Teaming with Mikrotik
Network LACP/Bonding/Teaming with Mikrotik
GLC Networks
Ccna PPT
Ccna PPT
AIRTEL
What's hot
(20)
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer)
Ccna rse dynamic routing
Ccna rse dynamic routing
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
EtherChannel Configuration
EtherChannel Configuration
CCNA
CCNA
PPP (Point to Point Protocol)
PPP (Point to Point Protocol)
Vlan lab
Vlan lab
Ether Channel High Speed Data Transmission
Ether Channel High Speed Data Transmission
Cisco CCNA- DHCP Server
Cisco CCNA- DHCP Server
Chapter 3 link aggregation
Chapter 3 link aggregation
CCNA PPT
CCNA PPT
Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1
Configuration of lan in cisco packet tracer by TAnjilur Rahman
Configuration of lan in cisco packet tracer by TAnjilur Rahman
Bluetooth protocol stack
Bluetooth protocol stack
6.5.1.2 packet tracer layer 2 security instructor
6.5.1.2 packet tracer layer 2 security instructor
Spanning tree protocol
Spanning tree protocol
OSI Layers
OSI Layers
Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)
Network LACP/Bonding/Teaming with Mikrotik
Network LACP/Bonding/Teaming with Mikrotik
Ccna PPT
Ccna PPT
Similar to 2.2.4.9 packet tracer configuring switch port security instructions - ig
Security Concerns in LANs.pptx
Security Concerns in LANs.pptx
joko
Activy tecnologi and instructions
Activy tecnologi and instructions
perhimpunan mahasiswa bone "ARUMPONE" Politeknik negeri ujung pandang
Exercise 4c stp rapid pvst+ question
Exercise 4c stp rapid pvst+ question
sufi1248
Switch security
Switch security
nullowaspmumbai
Cap2 configuring switch
Cap2 configuring switch
Hector Camba Lainez
CCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part II
Amir Jafari
Mitigating Layer2 Attacks
Mitigating Layer2 Attacks
dkaya
Switchport port security explained with examples
Switchport port security explained with examples
teameassefa
Lab 9 instructions
Lab 9 instructions
trayyoo
Free CCNP switching workbook by networkershome pdf
Free CCNP switching workbook by networkershome pdf
Networkershome
Understanding and Preventing Layer 2 Attacks
Understanding and Preventing Layer 2 Attacks
Tien Dung
Ch6
Ch6
scary5800
How to Configure Port-Security on Cisco Switch for Enhanced Network Security ...
How to Configure Port-Security on Cisco Switch for Enhanced Network Security ...
INFitunes
6.5.1.3 packet tracer layer 2 vlan security instructor
6.5.1.3 packet tracer layer 2 vlan security instructor
Salem Trabelsi
SRWE_Module_11.pptx
SRWE_Module_11.pptx
Josimar Caitano
Cisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch Port
IPMAX s.r.l.
Session 2
Session 2
ahmed elmeghiny
2.6.6 Packet Tracer - Verify Single-Area OSPFv2 - ILM.docx
2.6.6 Packet Tracer - Verify Single-Area OSPFv2 - ILM.docx
Josimar Caitano
LAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docx
LAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docx
croysierkathey
Exam viewer2
Exam viewer2
Jorgito Leal
Similar to 2.2.4.9 packet tracer configuring switch port security instructions - ig
(20)
Security Concerns in LANs.pptx
Security Concerns in LANs.pptx
Activy tecnologi and instructions
Activy tecnologi and instructions
Exercise 4c stp rapid pvst+ question
Exercise 4c stp rapid pvst+ question
Switch security
Switch security
Cap2 configuring switch
Cap2 configuring switch
CCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part II
Mitigating Layer2 Attacks
Mitigating Layer2 Attacks
Switchport port security explained with examples
Switchport port security explained with examples
Lab 9 instructions
Lab 9 instructions
Free CCNP switching workbook by networkershome pdf
Free CCNP switching workbook by networkershome pdf
Understanding and Preventing Layer 2 Attacks
Understanding and Preventing Layer 2 Attacks
Ch6
Ch6
How to Configure Port-Security on Cisco Switch for Enhanced Network Security ...
How to Configure Port-Security on Cisco Switch for Enhanced Network Security ...
6.5.1.3 packet tracer layer 2 vlan security instructor
6.5.1.3 packet tracer layer 2 vlan security instructor
SRWE_Module_11.pptx
SRWE_Module_11.pptx
Cisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch Port
Session 2
Session 2
2.6.6 Packet Tracer - Verify Single-Area OSPFv2 - ILM.docx
2.6.6 Packet Tracer - Verify Single-Area OSPFv2 - ILM.docx
LAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docx
LAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docx
Exam viewer2
Exam viewer2
Recently uploaded
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
121011101441
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
HafizMudaserAhmad
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
SAURABHKUMAR892774
welding defects observed during the welding
welding defects observed during the welding
MuhammadUzairLiaqat
Earthing details of Electrical Substation
Earthing details of Electrical Substation
stephanwindworld
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
saravananr517913
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Erbil Polytechnic University
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
ssuserb6619e
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Dr SOUNDIRARAJ N
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
Madan Karki
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptx
achiever3003
Research Methodology for Engineering pdf
Research Methodology for Engineering pdf
CaalaaAbdulkerim
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
Alluxio, Inc.
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
Erbil Polytechnic University
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
LewisJB
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
RajuKanojiya4
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
aditya806802
Recently uploaded
(20)
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
welding defects observed during the welding
welding defects observed during the welding
Earthing details of Electrical Substation
Earthing details of Electrical Substation
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptx
Research Methodology for Engineering pdf
Research Methodology for Engineering pdf
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
2.2.4.9 packet tracer configuring switch port security instructions - ig
1.
© 2013 Cisco
and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2 Packet Tracer - Configuring Switch Port Security (Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Device Interface IP Address Subnet Mask S1 VLAN 1 10.10.10.2 255.255.255.0 PC1 NIC 10.10.10.10 255.255.255.0 PC2 NIC 10.10.10.11 255.255.255.0 Rogue Laptop NIC 10.10.10.12 255.255.255.0 Objective Part 1: Configure Port Security Part 2: Verify Port Security Background In this activity, you will configure and verify port security on a switch. Port security allows you to restrict a port’s ingress traffic by limiting the MAC addresses that are allowed to send traffic into the port. Part 1: Configure Port Security a. Access the command line for S1 and enable port security on Fast Ethernet ports 0/1 and 0/2. S1(config)# interface range fa0/1 - 2 S1(config-if-range)# switchport port-security b. Set the maximum so that only one device can access the Fast Ethernet ports 0/1 and 0/2. S1(config-if-range)# switchport port-security maximum 1
2.
Packet Tracer -
Configuring Switch Port Security © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2 c. Secure the ports so that the MAC address of a device is dynamically learned and added to the running configuration. S1(config-if-range)# switchport port-security mac-address sticky d. Set the violation so that the Fast Ethernet ports 0/1 and 0/2 are not disabled when a violation occurs, but packets are dropped from an unknown source. S1(config-if-range)# switchport port-security violation restrict e. Disable all the remaining unused ports. Hint: Use the range keyword to apply this configuration to all the ports simultaneously. S1(config-if-range)# interface range fa0/3 - 24 , gi1/1 - 2 S1(config-if-range)# shutdown Part 2: Verify Port Security a. From PC1, ping PC2. b. Verify port security is enabled and the MAC addresses of PC1 and PC2 were added to the running configuration. c. Attach Rogue Laptop to any unused switch port and notice that the link lights are red. d. Enable the port and verify that Rogue Laptop can ping PC1 and PC2. After verification, shut down the port connected to Rogue Laptop. e. Disconnect PC2 and connect Rogue Laptop to PC2’s port. Verify that Rogue Laptop is unable to ping PC1. f. Display the port security violations for the port Rogue Laptop is connected to. S1# show port-security interface fa0/2 g. Disconnect Rouge Laptop and reconnect PC2. Verify PC2 can ping PC1. h. Why is PC2 able to ping PC1, but the Rouge Laptop is not? The port security that was enabled on the port only allowed the device, whose MAC was learned first, access to the port while preventing all other devices access.
Download now