Episode 34: Switch Interface Configuration and Port Security

Switch ports are more than just physical entry points—they’re policy enforcement zones, performance bottlenecks, and critical tools for maintaining Layer 2 security. In this episode, we walk through the fundamental configurations applied to switch interfaces, including setting the port mode (access vs. trunk), assigning VLANs, enabling speed and duplex settings, and applying descriptions for documentation clarity. We explain how misconfigurations in these settings can result in connectivity problems, broadcast issues, or outright communication failures across the network. These foundational commands and checks appear frequently in both real-world troubleshooting and CompTIA exam scenarios.
We also take a close look at port security—a vital Layer 2 defense against unauthorized device access. You’ll learn how to limit the number of allowed MAC addresses per port, enable sticky MACs, and configure violation actions like protect, restrict, or shutdown. We highlight common missteps, such as locking out legitimate users during printer swaps or failing to monitor security violations. By the end of this episode, you’ll understand how to control access to your switches at the edge while also improving network resilience and compliance.
Episode 34: Switch Interface Configuration and Port Security
Broadcast by