An engineer deploys a new Cisco Nexus 5000 Series Switch in an existing environment with strict security policies. The new device should meet these requirements:
* Secure end-user ports with minimum configuration effort.
* Log security breaches and require manual recovery.
* Retain the switch configuration if the device restarts.
Which configuration must be used?
Correct Answer: C
The configuration in option C, which includes commands such as switchport port-security, switchport port-security violation restrict, and switchport port-security mac-address sticky, meets the security requirements specified. This configuration secures the end-user ports by limiting the number of MAC addresses allowed on the port, logs security breaches without shutting down the port (restrict mode), and retains the MAC address configuration even if the device restarts (sticky option).
References:
* Cisco Nexus 5000 Series NX-OS Security Configuration Guide
* Cisco Data Center Core Technologies (DCCOR) study materials