19.07.2013 Views

CCNA Complete Guide 2nd Edition.pdf - Cisco Learning Home

CCNA Complete Guide 2nd Edition.pdf - Cisco Learning Home

CCNA Complete Guide 2nd Edition.pdf - Cisco Learning Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

- When a secure port is in the error-disabled (shutdown) state caused by a security violation, it can<br />

be re-enabled with the series of shutdown and no shutdown interface subcommands.<br />

- The switchport port-security mac-address sticky interface subcommand enables sticky<br />

learning – dynamically learn the MAC address from the first frame sent into a secure port, and<br />

add the MAC address as a secure MAC address to the running configuration.<br />

- The switchport port-security violation {protect | restrict | shutdown} interface<br />

subcommand configures the violation mode for a secure port. The default action is shutdown.<br />

In restrict and protect modes, frames with unauthorized MAC addresses are discarded instead of<br />

shutting down the secure port, and a log entry will (restrict) or will not (protect) be made.<br />

- The switchport port-security maximum [num] interface subcommand changes the<br />

maximum secure MAC addresses that will be allowed for a secure port. The default value is 1.<br />

Spanning Tree Protocol Configuration<br />

- STP is enabled by default in Catalyst switches, and hence no configuration is needed when<br />

connecting new switches that are out of the boxes, as STP will ensure that no loop can exist.<br />

- In the following example, SW1 and SW2 were connected together at Fa0/1 and Fa0/2, and SW1<br />

as the initial root bridge. Let’s begin by listing the spanning tree information, followed by<br />

configuring SW2’s Fa0/2 as the root port by changing the STP port cost. Finally, SW2 has been<br />

configured as the root bridge by changing the bridge priority with the spanning-tree vlan<br />

{vlan-id} root primary global configuration command.<br />

SW2#sh spanning-tree<br />

VLAN0001<br />

Spanning tree enabled protocol ieee<br />

Root ID Priority 32768<br />

Address aaaa.aaaa.aaaa<br />

Cost 19<br />

Port 1 (FastEthernet0/1)<br />

Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec<br />

Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)<br />

Address bbbb.bbbb.bbbb<br />

Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec<br />

Aging Time 300<br />

Interface Role Sts Cost Prio.Nbr Type<br />

---------------- ---- --- --------- -------- -------------------------------<br />

Fa0/1 Root FWD 19 128.1 P2p<br />

Fa0/2 Altn BLK 19 128.2 P2p<br />

SW2#debug spanning-tree events<br />

Spanning Tree event debugging is on<br />

SW2#<br />

SW2#conf t<br />

Enter configuration commands, one per line. End with CNTL/Z.<br />

SW2(config)#int fa0/2<br />

SW2(config-if)#spanning-tree cost 10<br />

SW2(config-if)#^Z<br />

SW2#<br />

47<br />

Copyright © 2008 Yap Chin Hoong<br />

yapchinhoong@hotmail.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!