what can be determined?

Refer to the exhibit.

From the configuration shown, what can be determined?

Refer to the exhibit.

From the configuration shown, what can be determined?

A.
The sticky addresses are only those manually configured MAC addresses enabled with the
sticky keyword.

B.
The remaining secure MAC addresses are learned dynamically, converted to sticky secure
MAC addresses, and added to the running configuration.

C.
A voice VLAN is configured in this example, so port security should be set for a maximum of 2.

D.
A security violation restricts the number of addresses to a maximum of 10 addresses per
access VLAN and voice VLAN. The port is shut down if more than 10 devices per VLAN attempt to
access the port.

Explanation:
By enabling sticky port security, you can configure an interface to convert the dynamic MAC
addresses to sticky secure MAC addresses and to add them to the running configuration. You
might want to do this if you do not expect the user to move to another port, and you want to avoid
statically configuring a MAC address on every port. To enable sticky port security, enter the
switchport port-security mac-address sticky command. When you enter this command, the
interface converts all the dynamic secure MAC addresses, including those that were dynamically
learned before sticky learning was enabled, to sticky secure MAC addresses. The sticky secure
MAC addresses do not automatically become part of the configuration file, which is the startup
configuration used each time the switch restarts. If you save the running config file to the
configuration file, the interface does not need to relearn these addresses when the switch restarts.
If you do not save the configuration, they are lost.
Reference:
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.2/53SG/configuration/port_sec.htm
l#wp1047668



Leave a Reply 0

Your email address will not be published. Required fields are marked *