Can anyone explain the STP Security features. Just like BPDU
guard, Root Guard.

Hi JITENDERA, i m specially looking for u?????

Answer Posted / jitendera kumar sinha

here is 3rd answer
ehternet gurd is also known as port securty
let undersatnd what is that

UnderstandingHow PortSecurity Works:
You can use port security to block input to an Ethernet,
Fast Ethernet, or Gigabit Ethernet
port when the MAC address of the station attempting to
access the port is different from
any of the MAC addresses specified for that port.
Alternatively, you can use port security
to filter traffic destined to or received from a specific
host based on the host MAC
address.
When a secure port receives a packet, the source MAC
address of the packet is compared
to the list of secure source addresses that were manually
configured or autoconfigured
(learned) on the port. If a MAC address of a device
attached to the port differs from the
list of secure addresses, the port either shuts down
permanently (default mode), shuts
down for the time you have specified, or drops incoming
packets from the insecure host.
The port's behavior depends on how you configure it to
respond to a security violation.
If a security violation occurs, the Link LED for that port
turns orange, and a link-down
trap is sent to the Simple Network Management Protocol
(SNMP) manager. An SNMP
trap is not sent if you configure the port for restrictive
violation mode. A trap is sent only
if you configure the port to shut down during a security
violation

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Suppose there are 3 pc's pc1 pc2 and pc3 all are connected with each other pc 1 is able to ping pc2 and pc3 but pc2 and pc 3 not able to ping pc 1 then what is an issue troubleshoot it?

1758


What are the advantages of a layered model in the networking industry?

683


Suppose we are having two Switches i.e. Switch1 & Switch2 Port1 of Switch1 is Connected to Uplink and switch2 is also connected to switch1? So 1>Is there is any loop? 2>How we come to know that there is a loop created? 3>If we add Switch3 to switch2 then there is a possibility of loop Creation?

1655


How does rip differs from igrp?

672


Brielfly explain the conversion steps in data encapsulation

689






Name the command we give for see routing table?

1938


Define logical topology.

662


What is de-encapsulation?

721


What is difference between routing and routed protocols?

629


What is default time of hello packets in ospf?

638


What is the usage of service password encryption?

699


Mention what is the difference between the switch, hub, and router?

594


Explain the term 'broadcast'.

614


What is passive topology in ccna?

659


Differnce between the communication and transmission?

602