Submit Search
Upload
2.2.4.9 packet tracer configuring switch port security instructions - ig
•
0 likes
•
3,202 views
Alex Ramirez
Follow
cisco, packet tracer
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 2
Download now
Download to read offline
Recommended
6.5.1.3 packet tracer layer 2 vlan security instructor
6.5.1.3 packet tracer layer 2 vlan security instructor
Salem Trabelsi
Lab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routing
Muhd Mu'izuddin
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructor
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructor
Salem Trabelsi
Cisco Packet Tracer Overview 20 Jul09
Cisco Packet Tracer Overview 20 Jul09
Tumennast Erdenebold
How to configure port security in cisco switch
How to configure port security in cisco switch
IT Tech
Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)
newbie2019
Ccna command
Ccna command
Siddhartha Rajbhatt
6.5.1.2 packet tracer layer 2 security instructor
6.5.1.2 packet tracer layer 2 security instructor
Salem Trabelsi
Recommended
6.5.1.3 packet tracer layer 2 vlan security instructor
6.5.1.3 packet tracer layer 2 vlan security instructor
Salem Trabelsi
Lab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routing
Muhd Mu'izuddin
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructor
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructor
Salem Trabelsi
Cisco Packet Tracer Overview 20 Jul09
Cisco Packet Tracer Overview 20 Jul09
Tumennast Erdenebold
How to configure port security in cisco switch
How to configure port security in cisco switch
IT Tech
Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)
newbie2019
Ccna command
Ccna command
Siddhartha Rajbhatt
6.5.1.2 packet tracer layer 2 security instructor
6.5.1.2 packet tracer layer 2 security instructor
Salem Trabelsi
Fools your enemy with MikroTik
Fools your enemy with MikroTik
Didiet Kusumadihardja
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
Salem Trabelsi
Free CCNP switching workbook by networkershome pdf
Free CCNP switching workbook by networkershome pdf
Networkershome
MikroTik Security
MikroTik Security
Rofiq Fauzi
7 hands on
7 hands on
videos
Spannig tree
Spannig tree
1 2d
Switches on Networking
Switches on Networking
Gayan Geethanjana
Vlan
Vlan
sanss40
GRE (generic routing encapsulation)
GRE (generic routing encapsulation)
Netwax Lab
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
Maximilan Wilhelm
CCNA IP Addressing
CCNA IP Addressing
Dsunte Wilson
Gateway load balancing protocol
Gateway load balancing protocol
Wahyu Nasution
Routing and switching essentials companion guide
Routing and switching essentials companion guide
Siddhartha Rajbhatt
Router configuration
Router configuration
ChoyonBonik
Mikro tik advanced training
Mikro tik advanced training
Jignesh H. Bhalsod
Routers and Routing Configuration
Routers and Routing Configuration
yasir1122
CCNA ppt Day 1
CCNA ppt Day 1
VISHNU N
Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)
Rofiq Fauzi
Cisco switch commands cheat sheet
Cisco switch commands cheat sheet
3Anetwork com
MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)
NetProtocol Xpert
Praktikum Lab 14 - Switch Security Configuration.docx
Praktikum Lab 14 - Switch Security Configuration.docx
Ihsan Ihsan
Security Concerns in LANs.pptx
Security Concerns in LANs.pptx
joko
More Related Content
What's hot
Fools your enemy with MikroTik
Fools your enemy with MikroTik
Didiet Kusumadihardja
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
Salem Trabelsi
Free CCNP switching workbook by networkershome pdf
Free CCNP switching workbook by networkershome pdf
Networkershome
MikroTik Security
MikroTik Security
Rofiq Fauzi
7 hands on
7 hands on
videos
Spannig tree
Spannig tree
1 2d
Switches on Networking
Switches on Networking
Gayan Geethanjana
Vlan
Vlan
sanss40
GRE (generic routing encapsulation)
GRE (generic routing encapsulation)
Netwax Lab
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
Maximilan Wilhelm
CCNA IP Addressing
CCNA IP Addressing
Dsunte Wilson
Gateway load balancing protocol
Gateway load balancing protocol
Wahyu Nasution
Routing and switching essentials companion guide
Routing and switching essentials companion guide
Siddhartha Rajbhatt
Router configuration
Router configuration
ChoyonBonik
Mikro tik advanced training
Mikro tik advanced training
Jignesh H. Bhalsod
Routers and Routing Configuration
Routers and Routing Configuration
yasir1122
CCNA ppt Day 1
CCNA ppt Day 1
VISHNU N
Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)
Rofiq Fauzi
Cisco switch commands cheat sheet
Cisco switch commands cheat sheet
3Anetwork com
MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)
NetProtocol Xpert
What's hot
(20)
Fools your enemy with MikroTik
Fools your enemy with MikroTik
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
Free CCNP switching workbook by networkershome pdf
Free CCNP switching workbook by networkershome pdf
MikroTik Security
MikroTik Security
7 hands on
7 hands on
Spannig tree
Spannig tree
Switches on Networking
Switches on Networking
Vlan
Vlan
GRE (generic routing encapsulation)
GRE (generic routing encapsulation)
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
CCNA IP Addressing
CCNA IP Addressing
Gateway load balancing protocol
Gateway load balancing protocol
Routing and switching essentials companion guide
Routing and switching essentials companion guide
Router configuration
Router configuration
Mikro tik advanced training
Mikro tik advanced training
Routers and Routing Configuration
Routers and Routing Configuration
CCNA ppt Day 1
CCNA ppt Day 1
Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)
Cisco switch commands cheat sheet
Cisco switch commands cheat sheet
MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)
Similar to 2.2.4.9 packet tracer configuring switch port security instructions - ig
Praktikum Lab 14 - Switch Security Configuration.docx
Praktikum Lab 14 - Switch Security Configuration.docx
Ihsan Ihsan
Security Concerns in LANs.pptx
Security Concerns in LANs.pptx
joko
Activy tecnologi and instructions
Activy tecnologi and instructions
perhimpunan mahasiswa bone "ARUMPONE" Politeknik negeri ujung pandang
Exercise 4c stp rapid pvst+ question
Exercise 4c stp rapid pvst+ question
sufi1248
Switch security
Switch security
nullowaspmumbai
Cap2 configuring switch
Cap2 configuring switch
Hector Camba Lainez
CCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part II
Amir Jafari
Mitigating Layer2 Attacks
Mitigating Layer2 Attacks
dkaya
Switchport port security explained with examples
Switchport port security explained with examples
teameassefa
Lab 9 instructions
Lab 9 instructions
trayyoo
Understanding and Preventing Layer 2 Attacks
Understanding and Preventing Layer 2 Attacks
Tien Dung
Ch6
Ch6
scary5800
How to Configure Port-Security on Cisco Switch for Enhanced Network Security ...
How to Configure Port-Security on Cisco Switch for Enhanced Network Security ...
INFitunes
SRWE_Module_11.pptx
SRWE_Module_11.pptx
Josimar Caitano
Cisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch Port
IPMAX s.r.l.
Session 2
Session 2
ahmed elmeghiny
Vlan lab
Vlan lab
tmim8
2.6.6 Packet Tracer - Verify Single-Area OSPFv2 - ILM.docx
2.6.6 Packet Tracer - Verify Single-Area OSPFv2 - ILM.docx
Josimar Caitano
LAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docx
LAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docx
croysierkathey
Exam viewer2
Exam viewer2
Jorgito Leal
Similar to 2.2.4.9 packet tracer configuring switch port security instructions - ig
(20)
Praktikum Lab 14 - Switch Security Configuration.docx
Praktikum Lab 14 - Switch Security Configuration.docx
Security Concerns in LANs.pptx
Security Concerns in LANs.pptx
Activy tecnologi and instructions
Activy tecnologi and instructions
Exercise 4c stp rapid pvst+ question
Exercise 4c stp rapid pvst+ question
Switch security
Switch security
Cap2 configuring switch
Cap2 configuring switch
CCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part II
Mitigating Layer2 Attacks
Mitigating Layer2 Attacks
Switchport port security explained with examples
Switchport port security explained with examples
Lab 9 instructions
Lab 9 instructions
Understanding and Preventing Layer 2 Attacks
Understanding and Preventing Layer 2 Attacks
Ch6
Ch6
How to Configure Port-Security on Cisco Switch for Enhanced Network Security ...
How to Configure Port-Security on Cisco Switch for Enhanced Network Security ...
SRWE_Module_11.pptx
SRWE_Module_11.pptx
Cisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch Port
Session 2
Session 2
Vlan lab
Vlan lab
2.6.6 Packet Tracer - Verify Single-Area OSPFv2 - ILM.docx
2.6.6 Packet Tracer - Verify Single-Area OSPFv2 - ILM.docx
LAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docx
LAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docx
Exam viewer2
Exam viewer2
Recently uploaded
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
ranjana rawat
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
Recently uploaded
(20)
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
2.2.4.9 packet tracer configuring switch port security instructions - ig
1.
© 2013 Cisco
and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2 Packet Tracer - Configuring Switch Port Security (Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Device Interface IP Address Subnet Mask S1 VLAN 1 10.10.10.2 255.255.255.0 PC1 NIC 10.10.10.10 255.255.255.0 PC2 NIC 10.10.10.11 255.255.255.0 Rogue Laptop NIC 10.10.10.12 255.255.255.0 Objective Part 1: Configure Port Security Part 2: Verify Port Security Background In this activity, you will configure and verify port security on a switch. Port security allows you to restrict a port’s ingress traffic by limiting the MAC addresses that are allowed to send traffic into the port. Part 1: Configure Port Security a. Access the command line for S1 and enable port security on Fast Ethernet ports 0/1 and 0/2. S1(config)# interface range fa0/1 - 2 S1(config-if-range)# switchport port-security b. Set the maximum so that only one device can access the Fast Ethernet ports 0/1 and 0/2. S1(config-if-range)# switchport port-security maximum 1
2.
Packet Tracer -
Configuring Switch Port Security © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2 c. Secure the ports so that the MAC address of a device is dynamically learned and added to the running configuration. S1(config-if-range)# switchport port-security mac-address sticky d. Set the violation so that the Fast Ethernet ports 0/1 and 0/2 are not disabled when a violation occurs, but packets are dropped from an unknown source. S1(config-if-range)# switchport port-security violation restrict e. Disable all the remaining unused ports. Hint: Use the range keyword to apply this configuration to all the ports simultaneously. S1(config-if-range)# interface range fa0/3 - 24 , gi1/1 - 2 S1(config-if-range)# shutdown Part 2: Verify Port Security a. From PC1, ping PC2. b. Verify port security is enabled and the MAC addresses of PC1 and PC2 were added to the running configuration. c. Attach Rogue Laptop to any unused switch port and notice that the link lights are red. d. Enable the port and verify that Rogue Laptop can ping PC1 and PC2. After verification, shut down the port connected to Rogue Laptop. e. Disconnect PC2 and connect Rogue Laptop to PC2’s port. Verify that Rogue Laptop is unable to ping PC1. f. Display the port security violations for the port Rogue Laptop is connected to. S1# show port-security interface fa0/2 g. Disconnect Rouge Laptop and reconnect PC2. Verify PC2 can ping PC1. h. Why is PC2 able to ping PC1, but the Rouge Laptop is not? The port security that was enabled on the port only allowed the device, whose MAC was learned first, access to the port while preventing all other devices access.
Download now