Ensure that port violations disable ports. Record the MAC address in the running configuration.Enable port security to allow only two hosts per port.Configure the port security feature to restrict network access:.VTY lines only accept SSH connections and use local login for authentication.RSA key-pair parameters to support SSH version 2.Configure SSH to secure remote access with the following settings:.Configure S1 with the following initial settings:.In this activity, you will use a list of requirements to configure the new switch with initial settings, SSH, and port security. The network administrator asked you to configure a new switch. Topology 5.3.1.2 Packet Tracer – Skills Integration Challenge Addressing Table Device Last Updated on Maby InfraExam 5.3.1.2 Packet Tracer – Skills Integration Challenge Packet Tracer – Skills Integration Challenge (Answer Version)Īnswer Note: Red font color or Gray highlights indicate text that appears in the Answer copy only.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |