Volume 2 - Chapter 11: Implementing Switch Port Security Flashcards

1
Q

True or False:

Switchport port security can be enabled on both access and trunk interfaces.

A

True, both access and trunk interfaces support port security.

However, the interface must be set statically to a trunk or access interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the command to set the maximum amount of violations that can be tolerated with port security?

A

switchport port-security maximum number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the command to set the violation type of port security for a specific interface?

A

switchport port-security violation protect / restrict / shutdown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the command to set an allowed static MAC address for an interface with port security enabled?

A

switchport port-security mac-address mac-address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the command to enable a sticky MAC address to be dynamically learned?

A

switchport port-security mac-address sticky

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False:

MAC-addresses learned by sticky configuration will be saved to the startup-configuration automatically.

A

False; until the running configuration is saved to memory manually, the sticky MACs that are learned on an interface will be lost if the switch reboots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What adjustment to the interface configuration is recommended when port-security is enabled on a voice port?

A

The maximum allowed MAC addresses should be increased to 2; one for the workstation, one for the phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False:

Port Security can be enabled on port-channel (EtherChannel) interfaces.

A

True; but make sure you configure the port-security commands on the port-channel interface, and not on the physical interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What command can be used to check the current port-security statistics on an interface?

A

show port-security interface interfacename

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the difference between the following commands:

show mac address-table secure
show mac address-table static

A

Secure; shows only MAC addresses that are associated with ports that have port security enabled.

Static; shows MAC addresses that are associated with ports that have port security enabled, as well as all statically configured MACs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MAC addresses that are learned or configured on port-security enabled interfaces are no longer considered to be ____ ____.

A

dynamically learned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 3 commands that can be used to list MAC addresses learned or configured with port-security?

A

show mac address-table static
show mac address-table secure
show mac address-table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe the difference between the port-security “restrict” and “protect” modes.

A

Both restrict and protect will both discard traffic when pushed past the maximum, but only restrict will generate a log entry and send an SNMP trap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What command can be used to enable automatic recovery of ports in an err-disable state due to port-security?

A

errdisable recovery cause psecure-violation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What command can be used to set the recovery interval used to restore interfaces in an err-disable state?

A

errdisable recovery interval seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly