SWITCH 2.0: Storm Control & Port-Based Authentication

Cisco SWITCH 2.0    |    Expert
  • 2 Videos | 46m 36s
  • Includes Assessment
Likes 11 Likes 11
Explore the use of Storm Control on a Cisco switch, the Layer 2 threat it prevents, and how to configure and verify it. Discover port-based authentication, including its requirements, usage, and configuration. This course will help prepare for the 300-115: Implementing Cisco IP Switched Networks 2.0 certification exam.

WHAT YOU WILL LEARN

  • identify the cause of data storms on switched networks
    specify the steps for configuring storm control in a given scenario
    specify how storm control reduces the risk of L2 data storms
    specify the steps for configuring an 802.1x authenticator port
  • identify the steps used to configure a Cisco switch for global 802.1x authentication
    recognize characteristics of port-based authentication
    identify required infrastructure elements for configuring an 802.1x network
    recognize permissible traffic on ports secured through port-based authentication

IN THIS COURSE

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 11 Likes 11  
Likes 13 Likes 13  
Likes 37 Likes 37