Question: Chapter 6 Assignment 6.1 Explain commands to Configuring switch port security on switch? Command Description Switch(config-if)#switchport port-security Switch(config-if)#switchport port-security violation shutdown 6.2 What is the
Chapter 6 Assignment
6.1 Explain commands to Configuring switch port security on switch?
Command Description
Switch(config-if)#switchport port-security
Switch(config-if)#switchport port-security violation shutdown
6.2 What is the function of mac address sticky command?
6.3 Which command will verify port security configurations?
6.4 What actions are taken by a switch when Port Security Violation Occurs?
Violation Mode Description Restrict
| Switch(config-if)#switchport mode access or trunk |
| Switch(config-if)#switchport port-security maximum 1 |
| Switch(config-if)#switchport port-security mac-address sticky |
| Protect |
| Shutdown |
Chapter 7 Assignment
7.1 What messages are used by DHCP server to communicate with a DHCP client?
Messages Description
7.2 Write commands to configure DHCP on a switch interface vlan 1.
7.3 Which command will verify port security configurations?
7.4 What commands are used to check host IP settings on windows?
8.1 Explain DHCP Snooping?
Chapter 8 Assignment
8.2 Which command will enable DHCP snooping globally on switch SW1?
8.3 Which command will enable DHCP snooping on a vlan1 of a Switch SW1?
8.4 Which command will configure an interface as a trusted source of DHCP messages on switch SW1?
8.5 Which set of commands will enable IP ARP inspection on a vlan of switch SW1 and enable trust on a port that bypass ARP Inspection?
Chapter 9 Assignment
9.1 Why System Message logging (Syslog) is important in Cisco IOS?
9.2 Write syslog message severity levels and what they actually mean.
Severity Level Description
1 3 5
7
9.3 Why loopback interfaces are used for better availability of NTP?
| 0 |
| 2 |
| 4 |
| 6 |
9.4 What details Cisco discovery protocol (CDP) discovers from neighboring routers?
| Device identifier | |
| Address list | |
| Port Identifier | |
| Capabilities | |
| Platform |
9.5 Write commands that list information about neighbors.
9.6 What command is used to configure Link Layer Discovery Protocol LLDP?
Chapter 10 Assignment
10.1 What features helped extend the life of IPv4?
10.2 Compare Network Address Translation (NAT) and Port Address Translation (PAT)?
NAT PAT
| 1. 2. 3. 4. 5. 6. 7. 8. |
10.3 What does the Inside Global address represent in the configuration of NAT?
10.4 Why we use access-list in NAT?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
