Difference between revisions of "CCNA Explorer 3 Basic Switch Concepts and Configuration"
From Teknologisk videncenter
m |
m |
||
Line 105: | Line 105: | ||
|[[Image:ScreenShot066.jpg|800px|left|thumb|EXEC mode password]] | |[[Image:ScreenShot066.jpg|800px|left|thumb|EXEC mode password]] | ||
|- | |- | ||
− | |[[Image: | + | |[[Image:ScreenShot1061.jpg|800px|left|thumb|Configure encypted passwords]] |
|- | |- | ||
|[[Image:ScreenShot001.jpg|800px|left|thumb|Password recovery]] | |[[Image:ScreenShot001.jpg|800px|left|thumb|Password recovery]] | ||
Line 132: | Line 132: | ||
|- | |- | ||
|[[Image:ScreenShotNew010.jpg|800px|left|thumb|MAC flooding attack step 5]] | |[[Image:ScreenShotNew010.jpg|800px|left|thumb|MAC flooding attack step 5]] | ||
− | | | + | |} |
− | + | [http://www.cisco.com/en/US/docs/switches/lan/catalyst3750/software/release/12.2_25_see/configuration/guide/swsdm.html SDM Templates] | |
+ | |||
===DHCP Spoofing=== | ===DHCP Spoofing=== | ||
{| | {| | ||
Line 151: | Line 152: | ||
|- | |- | ||
|[[Image:ScreenShotNew017.jpg|800px|left|thumb|Secure Unused Ports]] | |[[Image:ScreenShotNew017.jpg|800px|left|thumb|Secure Unused Ports]] | ||
− | |- | + | |} |
− | + | '''Security Violation Modes''' | |
+ | *'''Protect''': When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped. | ||
+ | *'''Restrict''': When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped. A SNMP trap is sent, a syslog message is logged, and the violation counter increments. | ||
+ | *'''Shutdown''': In this mode, a port security violation causes the interface to immediately become error-disabled and turns off the port LED. It also sends an SNMP trap, logs a syslog message. |
Revision as of 07:32, 8 August 2011
| ||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||
ContentsNavigating Command-Line Interfaces Modes
|