How can you ensure that only the MAC address of a server is allowed by switch port Fa0/1?
A.
Configure port Fa0/1 to accept connections only from the static IP address of the server.
B.
Configure the server MAC address as a static entry of port security.
C.
Use a proprietary connector type on Fa0/1 that is incomputable with other host connectors.
D.
Bind the IP address of the server to its MAC address on the switch to prevent other hosts from
spoofing the server IP address.
As you see, the MAC address of the R1 E0/0 interface has been learned dynamically from the incoming frames on SW1 port F0/1. At this stage, I must explain the difference between dynamic and static entries in the MAC address table.
DYNAMIC – the entry is created from the incoming frames by reading the source MAC address field in the Ethernet header. The entry is valid for 5 minutes (300 seconds) by default. If the host with this source address (here R1) does not send any frame towards the port of the SW1 for 300 seconds, the entry is removed. Every time, the R1 sends a frame towards the SW1 F0/1, the entry timer is reset, or if the entry has already been removed, the same MAC address is mapped to the port again.
STATIC – the entry (MAC address) is permanently mapped to a specific port. It does not age like a ‘dynamic’ entry. The switch does not create this MAC address to port mapping by reading the source MAC address, but it is the administrator of the switch that creates it in the global config mode using ‘mac address-table static’ command.
Switches use MAC address