Question: Chapter 6 Assignment 6.1 Explain commands to Configuring switch port security on switch? Command Description Switch(config-if)#switchport port-security Switch(config-if)#switchport port-security violation shutdown 6.2 What is the

Chapter 6 Assignment

6.1 Explain commands to Configuring switch port security on switch?

Command Description

Switch(config-if)#switchport port-security

Switch(config-if)#switchport port-security violation shutdown

6.2 What is the function of mac address sticky command?

6.3 Which command will verify port security configurations?

6.4 What actions are taken by a switch when Port Security Violation Occurs?

Violation Mode Description Restrict

Switch(config-if)#switchport mode access or trunk

Switch(config-if)#switchport port-security maximum 1

Switch(config-if)#switchport port-security mac-address sticky

Protect

Shutdown

Chapter 7 Assignment

7.1 What messages are used by DHCP server to communicate with a DHCP client?

Messages Description

7.2 Write commands to configure DHCP on a switch interface vlan 1.

7.3 Which command will verify port security configurations?

7.4 What commands are used to check host IP settings on windows?

8.1 Explain DHCP Snooping?

Chapter 8 Assignment

8.2 Which command will enable DHCP snooping globally on switch SW1?

8.3 Which command will enable DHCP snooping on a vlan1 of a Switch SW1?

8.4 Which command will configure an interface as a trusted source of DHCP messages on switch SW1?

8.5 Which set of commands will enable IP ARP inspection on a vlan of switch SW1 and enable trust on a port that bypass ARP Inspection?

Chapter 9 Assignment

9.1 Why System Message logging (Syslog) is important in Cisco IOS?

9.2 Write syslog message severity levels and what they actually mean.

Severity Level Description

1 3 5

7

9.3 Why loopback interfaces are used for better availability of NTP?

0

2

4

6

9.4 What details Cisco discovery protocol (CDP) discovers from neighboring routers?

Device identifier

Address list

Port Identifier

Capabilities

Platform

9.5 Write commands that list information about neighbors.

9.6 What command is used to configure Link Layer Discovery Protocol LLDP?

Chapter 10 Assignment

10.1 What features helped extend the life of IPv4?

10.2 Compare Network Address Translation (NAT) and Port Address Translation (PAT)?

NAT PAT

1. 2. 3. 4. 5. 6. 7. 8.

10.3 What does the Inside Global address represent in the configuration of NAT?

10.4 Why we use access-list in NAT?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!