Chapter 9 Configuring Switch interfaces Flashcards
Which of the following describes a way to disable IEEE standard autonegotiation on a 10/100 port on a Cisco switch?
a. Configure the negotiate disable interface subcommand
b. Configure the no negotiate interface subcommand
c. Configure the speed 100 interface subcommand
d. Configure the duplex half interface subcommand
e. Configure the duplex full interface subcommand
f. Configure the speed 100 and duplex full interface subcommands
f. Configure the speed 100 and duplex full interface subcommands
In which of the following modes of the CLI could you configure the duplex setting for interface Fast Ethernet 0/5?
e. Interface configuration mode
A Cisco Catalyst switch connects with its Gigabit0/1 port to an end user’s PC. The end user, thinking the user is helping, manually sets the PC’s OS to use a speed of 1000 Mbps and to use full duplex, and disables the use of autonegotiation. The switch’s G0/1 port has default settings for speed and duplex. What speed and duplex settings will the switch decide to use? (Choose two answers.)
a. Full duplex
b. Half duplex
c. 10 Mbps
d. 1000 Mbps
A,D
Which of the following is required when configuring port security with sticky learning?
a. Setting the maximum number of allowed MAC addresses on the interface with the switchport port-security maximum interface subcommand.
b. Enabling port security with the switchport port-security interface subcommand.
c. Defining the specific allowed MAC addresses using the switchport port-security
mac-address interface subcommand.
d. All the other answers list required commands.
B
A switch’s port Gi0/1 has been correctly enabled with port security. The configura- tion sets the violation mode to restrict. A frame that violates the port security policy enters the interface, followed by a frame that does not. Which of the following answers correctly describe what happens in this scenario? (Choose two answers.)
a. The switch puts the interface into an err-disabled state when the first frame arrives.
b. The switch generates syslog messages about the violating traffic for the first frame.
c. The switch increments the violation counter for Gi0/1 by 1.
d. The switch discards both the first and second frame.
B,C
A Cisco Catalyst switch connects to what should be individual user PCs. Each port has the same port security configuration, configured as follows:
interface range gigabitethernet 0/1 - 24
switchport mode access
switchport port-security
switchport port-security mac-address sticky
Which of the following answers describe the result of the port security configuration created with these commands? (Choose two answers.)
B,D
shows a way to shorten your configuration work when making the same setting on multiple consecutive interfaces.
To do so, use the interface range command.
You can define a range as long as
all interfaces are the same type and are numbered consecutively.
IOS does not actually put the interface range command into the configuration.Instead,
it acts as if you had typed the subcommand under every single interface in the specified range
Cisco uses two interface subcommands to configure the idea of administratively enabling and disabling an interface:
the shutdown command (to disable), and the no shutdown command (to enable)
IEEE autonegotiation defines some rules (defaults) that nodes should use as defaults when autonegotiation fails—that is, when a node tries to use autonegotiation but hears nothing from the device. The rules:
Speed: Use your slowest supported speed (often 10 Mbps).
■ Duplex: If your speed = 10 or 100, use half duplex; otherwise, use full duplex.
Cisco switches use this slightly different logic to choose the speed when autonegotia- tion fails:
Speed: Sense the speed (without using autonegotiation), but if that fails, use the IEEE default (slowest supported speed, often 10 Mbps).
■ Duplex: Use the IEEE defaults: If speed = 10 or 100, use half duplex; otherwise, use full duplex.
Basically, hubs do not react to autone- gotiation messages, and they do not forward the messages. As a result,
devices connected to a hub must use the IEEE rules for choosing default settings, which often results in the devices using 10 Mbps and half duplex.
summarizes these ideas common to all variations of port security:
■ Define a maximum number of source MAC addresses allowed for all frames coming in the interface.
■ Watch all incoming frames, and keep a list of all source MAC addresses, plus a counter of the number of different source MAC addresses.
■ When adding a new source MAC address to the list, if the number of MAC addresses pushes past the configured maximum, a port security violation has occurred. The switch takes action (the default action is to shut down the interface).
Port security provides an easy way to discover the MAC addresses used off each port using a feature called
ticky secure MAC addresses