(1. Configure port security on the switch, and how to manage violations. 2 The two switches are connected with a crossover cable, and a PC is connected to the main switch to verify the link. Connect two PCs under the secondary switch. Configure the maximum number of security addresses on the master switch, and verify that when the number of mac addresses on the port exceeds the maximum number of security addresses, the link fails and is managed in the specified violation management mode. 3. Configure and bind on the main switch This document includes the following attachments:
Lab 17 Switch Port Security.pdf
Including multiple files, please download and view by yourself! This resource is collected by the resource sea IT data station.)