Chap6_Sect1_Intro Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
| Term | Definition |
| Secure Shell (SSH) | A protocol that provides a secure (encrypted) management connection to a remote device. |
| Port Security | Feature that limits the number of valid MAC addresses allowed on a port. |
| Violation Mode | A configuration to a port interface that specifies a specific action to be taken if a violation occurs. |
| Protect Violation Mode | When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped. There is no notification that a security violation has occurred. |
| Restrict Violation Mode | When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped. In this mode, there is a notification that a security violation has occurred. |
| Shutdown Violation Mode | In this (default) mode, a port security violation causes the interface to immediately become error-disabled and turns off the port LED. |
| Static Secure MAC Addresses | MAC addresses that are manually configured on a port by using the switchport port-security mac-address mac-address interface configuration mode command. |
| Dynamic Secure MAC Addresses | MAC addresses that are dynamically learned and stored only in the address table. |
| Sticky Secure MAC Addresses | MAC addresses that can be dynamically learned or manually configured, then stored in the address table and added to the running configuration. |
Created by:
CTE-ECOT
Popular Computers sets