You are on page 1of 1

6.6.

7 Configure Port Security 2


You are implementing port security within your network. You have two IP phone daisy chains
connected to the switch's FastEthernet 0/5 and 0/6 interfaces. The interfaces are configured as access
ports. Voice VLANs and the trusted boundary feature have already been configured on both of the
interfaces. You need to configure the port security settings to have the switch interface accept the
MAC addresses of the IP phone and the workstation.

Complete the following tasks:

 Configure FastEthernet 0/5 and 0/6 with port security to learn the MAC address of the IP
phone and workstation.
 Set the maximum allowed MAC addresses to 3.
 Configure the port security violation as restrict.
 Save your changes to the startup-config file.

Use the show run command to verify the configurations.


Start Lab

You might also like