click below
click below
Normal Size Small Size show me how
Chap6_Sect1_Intro
VLAN Segmentation
Term | Definition |
---|---|
Secure Shell (SSH) | A protocol that provides a secure (encrypted) management connection to a remote device. |
Port Security | Feature that limits the number of valid MAC addresses allowed on a port. |
Violation Mode | A configuration to a port interface that specifies a specific action to be taken if a violation occurs. |
Protect Violation Mode | When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped. There is no notification that a security violation has occurred. |
Restrict Violation Mode | When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped. In this mode, there is a notification that a security violation has occurred. |
Shutdown Violation Mode | In this (default) mode, a port security violation causes the interface to immediately become error-disabled and turns off the port LED. |
Static Secure MAC Addresses | MAC addresses that are manually configured on a port by using the switchport port-security mac-address mac-address interface configuration mode command. |
Dynamic Secure MAC Addresses | MAC addresses that are dynamically learned and stored only in the address table. |
Sticky Secure MAC Addresses | MAC addresses that can be dynamically learned or manually configured, then stored in the address table and added to the running configuration. |