Can anyone explain the STP Security features. Just like BPDU
guard, Root Guard.
Hi JITENDERA, i m specially looking for u?????
Answer Posted / jitendera kumar sinha
here is 3rd answer
ehternet gurd is also known as port securty
let undersatnd what is that
UnderstandingHow PortSecurity Works:
You can use port security to block input to an Ethernet,
Fast Ethernet, or Gigabit Ethernet
port when the MAC address of the station attempting to
access the port is different from
any of the MAC addresses specified for that port.
Alternatively, you can use port security
to filter traffic destined to or received from a specific
host based on the host MAC
address.
When a secure port receives a packet, the source MAC
address of the packet is compared
to the list of secure source addresses that were manually
configured or autoconfigured
(learned) on the port. If a MAC address of a device
attached to the port differs from the
list of secure addresses, the port either shuts down
permanently (default mode), shuts
down for the time you have specified, or drops incoming
packets from the insecure host.
The port's behavior depends on how you configure it to
respond to a security violation.
If a security violation occurs, the Link LED for that port
turns orange, and a link-down
trap is sent to the Simple Network Management Protocol
(SNMP) manager. An SNMP
trap is not sent if you configure the port for restrictive
violation mode. A trap is sent only
if you configure the port to shut down during a security
violation
Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
Which company mange ip's?
What are the types of communication in ipv6 ?
What do you understand by redundancy?
Utilizing RIP, what is the limit when it comes to number of hops?
Name the protocol which can do load balancing on unequal cost also?
What is the easiest way to remotely configure a router?
Can you explain PAP?
Which command we give for live view of remote site routers?
What is ping? What is the usage of ping?
How much internal and external ad of eigrp protocol?
What is the difference between rip and igrp?
Value in which type of access list?
Which reserve port number talent use?
How do we do encryption and authentication in L2F?
How is private ip different from public ip?