Difference between revisions of "CCNA Explorer 3 Basic Switch Concepts and Configuration"
From Teknologisk videncenter
m |
m |
||
(4 intermediate revisions by the same user not shown) | |||
Line 120: | Line 120: | ||
|- | |- | ||
| | | | ||
+ | Hvad med '''aaa new-model''' & '''username cisco password cisco''' | ||
==Common Security Attacks== | ==Common Security Attacks== | ||
===MAC Address Flooding=== | ===MAC Address Flooding=== | ||
Line 156: | Line 157: | ||
*'''Protect''': When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped. | *'''Protect''': When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped. | ||
*'''Restrict''': When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped. A SNMP trap is sent, a syslog message is logged, and the violation counter increments. | *'''Restrict''': When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped. A SNMP trap is sent, a syslog message is logged, and the violation counter increments. | ||
− | *'''Shutdown''': In this mode, a port security violation causes the interface to immediately become error-disabled and turns off the port LED. It also sends an SNMP trap, logs a syslog message. | + | *'''Shutdown'''(Default<ref>http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/port_sec.html#wp1038518</ref>): In this mode, a port security violation causes the interface to immediately become error-disabled and turns off the port LED. It also sends an SNMP trap, logs a syslog message. |
+ | =References= | ||
+ | <references/> |
Latest revision as of 10:00, 7 August 2013
| ||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||
ContentsNavigating Command-Line Interfaces Modes
|