Describe the violation command for configuring port security.

What will be an ideal response?


The violation command dictates what happens when a switch encounters a violation of the configured switchport security. The default is to shut down the interface. You can also define the action with one of the following three options: protect, restrict, and shutdown. The protect option stops forwarding of traffic from any host that connects after the maximum number of MAC addresses has been learned. In our example, the maximum number of MAC addresses is 10. If the protect option was selected, the 11th address and any subsequent new MAC addresses on the port would be prevented from communicating. The restrict option also stops all traffic above the number of defined MAC addresses. In addition, it sends an alert that a security violation has occurred. The final option, shutdown, shuts the port down if a security violation occurs.

Computer Science & Information Technology

You might also like to view...

The call stack contains, among other things, the method's local variables.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

If the following sentence is free of errors, choose the answer True. If there are errors in the sentence, choose the answer False and explain how to correct the sentence.As soon as you get your credit card statement, check is for errors.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) _____________ is a collection of hardware and operating systems used to create new virtual machines.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

DSL signals travel over telephone lines using the 300 to 3300 Hz frequency range.

Computer Science & Information Technology