Can anyone explain the STP Security features. Just like BPDU
guard, Root Guard.
Hi JITENDERA, i m specially looking for u?????
Answers were Sorted based on User's Feedback
Answer / jitendera kumar sinha
Spanning Tree Protocol Features
1 Bridge Protocol Data Unit (BPDU) Guard
2 Root Guard
3 EtherChannel Guard
4 Loop Guard
these 4 are major spaing tree feature
for understand that at first we must understand the spaing
tree term
root bridge-it is the bridge with the best bridge id.it is
the focal point of the network and which point is block and
which point is in forwading mode is are made from the root
bridge.
here comes bpdu gurd
slection cretirea of root bridge depend upon BPdu default
vale 2 sec.
each bpdu conatin
1 mac address
2 bridge priorty(32768 default)
3 bridge identy
so
BPDU contains management and control data information that
is used to determine the root bridge and establish the port
roles—for example: root, designated, or blocked port.
2 root port-.the root port is alway link directly conected
to root bridge.if there is more then one link then port
cost is detirmine if port cost is smae then bridge identy
comes in account
here comes root gurd
in a shairesd swiched envorment where there is many
conection betwen switches it is important to identify the
correct placement of the root bridge.With the Root Guard
feature, a Layer 2 interface is set as the designated port,
and if any device through this port becomes the root
bridge, the interface is placed into the blocked stae
this is all about root gurd
i will expalin two parametar tomorrow because i have some
work
thanks
jitendera kumar sinha
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / jitendera kumar sinha
here is 3rd answer
ehternet gurd is also known as port securty
let undersatnd what is that
UnderstandingHow PortSecurity Works:
You can use port security to block input to an Ethernet,
Fast Ethernet, or Gigabit Ethernet
port when the MAC address of the station attempting to
access the port is different from
any of the MAC addresses specified for that port.
Alternatively, you can use port security
to filter traffic destined to or received from a specific
host based on the host MAC
address.
When a secure port receives a packet, the source MAC
address of the packet is compared
to the list of secure source addresses that were manually
configured or autoconfigured
(learned) on the port. If a MAC address of a device
attached to the port differs from the
list of secure addresses, the port either shuts down
permanently (default mode), shuts
down for the time you have specified, or drops incoming
packets from the insecure host.
The port's behavior depends on how you configure it to
respond to a security violation.
If a security violation occurs, the Link LED for that port
turns orange, and a link-down
trap is sent to the Simple Network Management Protocol
(SNMP) manager. An SNMP
trap is not sent if you configure the port for restrictive
violation mode. A trap is sent only
if you configure the port to shut down during a security
violation
| Is This Answer Correct ? | 1 Yes | 0 No |
Suppose there are 3 pc's pc1 pc2 and pc3 all are connected with each other pc 1 is able to ping pc2 and pc3 but pc2 and pc 3 not able to ping pc 1 then what is an issue troubleshoot it?
What is true when using DDR? A.) HDLC is the preferred encapsulation B.) You must use static routing C.) You should use dynamic routing D.) You should use ISDN
Identify command that configures 'Cisco1' as a secret password? A.) Router(config)# enable secret password Cisco1 B.) Router(config)# enable secret cisco1 C.) Router(config)# enable password Cisco1 D.) Router(config)# enable secret Cisco1
Which show command should you use to view Frame Relay Local Management Interface (LMI) Frame statistics? A. show lmi B. show ip route C. show interface D. show statistics E. show frame-relay lmi
bWhich form of PPP error detection on Cisco routers monitors data dropped on a link? A. Quality B. Magic Number C. Error Monitor D. Droplink
Which layer called error detection layer?
Identify the command to configure the router to boot from an IOS located on a TFTP server? A.) boot system tftp IOS.exe 172.16.5.1 B.) boot system tftp 172.16.5.1 IOS.exe C.) boot system flash tftp 172.16.5.1 D.) boot system IOS.exe 172.16.5.1
Hi -All Can you tell me About of NAt (Network Address Tranlator) bcoz i have no idea about this topics Such as local ip , global ip and all plz provide the deatil of this topics
When would you use ISDN? A.) To connect LANs using POTS B.) To support applications requiring voice, data, and video C.) When you need a consistent and very high rate of data speed D.) To connect to IBM mainframes
What is a characteristic of Store and Forward switches? A.) They forward the frame before it is completely read. B.) They work at wire speed. C.) They are the same a Cut-Through switching. D.) They read the entire frame and check CRC before forwarding. E.) They decrease latency.
Which statement about the Point to Point Protocol (PPP) is true? A. PPP supports TCP/IP but not Novell IPX B. PPP is being phased out of existence by the Serial Line Internet Protocol (SLIP) C. PPP providces router to router and host to network connections over both synchronous and asynchronous circuits D. PPP is an ITU T and ANSI standard that defines the process for sending data over a packet switched data network (PSDN)
What does -1 signify in an extended IPX access list? A. permit this host B. deny this host C. permit only this subnet D. any host or any network