Debut is a free screen video recording software for mac. Record videos from your screen or other video devices. Capture your entire desktop or a selected portion and save the recorded videos as avi, flv, wmv or other video file formats. I use my Powerbook G4 for sys admin via serial. Ive used it for servers and switches. I highly recommend the Keyspan USB-Serial adapter. Works like a charm and comes with Mac drivers. Ive used it with the blue Cisco cable too. ![]() Once installed, and hooked up to your server/switch, fire up a Terminal window, and type: screen /dev/cu.USBXXXXX (where XXXX is a string of characters specific to your serial adapter if I remember correctly) This will put you in a 'screen' session (think of it as a virtual terminal - check 'man screen') on your Mac using the serial port, just like hyperterminal. Sorry if ive not explained very well, ive not had coffee yet! PM me if you need more help. How to Configure Switch Port Security on Cisco Switches – Technig Port Security Guidelines and Restrictions Follow these guidelines when configuring port security. • A secure port cannot be a trunk port. • A secure port cannot be a destination port for Switch Port Analyzer (SPAN). • A secure port cannot belong to an EtherCha nnel port-channel interface. • A secure port and static MAC address configuration are mutually exclusive. Configure Switch Port Security These sections describe how to configure port security using the Packet Tracer – Configuring Switch Port Security Lab. In this activity, you will configure and verify port security on a switch. Port security allows you to restrict a port’s ingress traffic by limiting the MAC addresses that are allowed to send traffic to the port. Part 1: Configure Port Security a. Access the command line for S1 and enable port security on Fast Ethernet ports 0/1 and 0/2. SW1 ( config - if - range ) #shutdown It’s all and enough to configure switch port security on this lab. Let’s test it. Part 2: Verify Port Security Try to test your switch port security configuration with ping command and testing with the rogue laptop on the lab • a. Neymar skills and goals download. From PC1, ping PC2. Verify port security is enabled and the MAC addresses of PC1 and PC2 were added to the running configuration with “ show run” command. Attach Rogue Laptop to any unused switch port and notice that the link lights are red. Enable the port and verify that Rogue Laptop can ping PC1 and PC2. After verification shut down the port connected to Rogue Laptop. Disconnect PC2 and connect Rogue Laptop to PC2’s port. Verify that Rogue Laptop is unable to ping PC1. Display the port security violations for the port Rogue Laptop is connected to. Disconnect Rouge Laptop and reconnect PC2.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |