Can anyone explain the STP Security features. Just like BPDU
guard, Root Guard.
Hi JITENDERA, i m specially looking for u?????
Answer Posted / jitendera kumar sinha
here is 3rd answer
ehternet gurd is also known as port securty
let undersatnd what is that
UnderstandingHow PortSecurity Works:
You can use port security to block input to an Ethernet,
Fast Ethernet, or Gigabit Ethernet
port when the MAC address of the station attempting to
access the port is different from
any of the MAC addresses specified for that port.
Alternatively, you can use port security
to filter traffic destined to or received from a specific
host based on the host MAC
address.
When a secure port receives a packet, the source MAC
address of the packet is compared
to the list of secure source addresses that were manually
configured or autoconfigured
(learned) on the port. If a MAC address of a device
attached to the port differs from the
list of secure addresses, the port either shuts down
permanently (default mode), shuts
down for the time you have specified, or drops incoming
packets from the insecure host.
The port's behavior depends on how you configure it to
respond to a security violation.
If a security violation occurs, the Link LED for that port
turns orange, and a link-down
trap is sent to the Simple Network Management Protocol
(SNMP) manager. An SNMP
trap is not sent if you configure the port for restrictive
violation mode. A trap is sent only
if you configure the port to shut down during a security
violation
Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
Suppose there are 3 pc's pc1 pc2 and pc3 all are connected with each other pc 1 is able to ping pc2 and pc3 but pc2 and pc 3 not able to ping pc 1 then what is an issue troubleshoot it?
What are the advantages of a layered model in the networking industry?
Suppose we are having two Switches i.e. Switch1 & Switch2 Port1 of Switch1 is Connected to Uplink and switch2 is also connected to switch1? So 1>Is there is any loop? 2>How we come to know that there is a loop created? 3>If we add Switch3 to switch2 then there is a possibility of loop Creation?
How does rip differs from igrp?
Brielfly explain the conversion steps in data encapsulation
Name the command we give for see routing table?
Define logical topology.
What is de-encapsulation?
What is difference between routing and routed protocols?
What is default time of hello packets in ospf?
What is the usage of service password encryption?
Mention what is the difference between the switch, hub, and router?
Explain the term 'broadcast'.
What is passive topology in ccna?
Differnce between the communication and transmission?