SWITCH 2.0: Storm Control & Port-Based Authentication
Cisco SWITCH 2.0
| Expert
- 2 Videos | 46m 36s
- Includes Assessment
Explore the use of Storm Control on a Cisco switch, the Layer 2 threat it prevents, and how to configure and verify it. Discover port-based authentication, including its requirements, usage, and configuration. This course will help prepare for the 300-115: Implementing Cisco IP Switched Networks 2.0 certification exam.
WHAT YOU WILL LEARN
-
identify the cause of data storms on switched networksspecify the steps for configuring storm control in a given scenariospecify how storm control reduces the risk of L2 data stormsspecify the steps for configuring an 802.1x authenticator port
-
identify the steps used to configure a Cisco switch for global 802.1x authenticationrecognize characteristics of port-based authenticationidentify required infrastructure elements for configuring an 802.1x networkrecognize permissible traffic on ports secured through port-based authentication
IN THIS COURSE
-
1.Switch Security: Storm Control17m 19s
-
2.Port-Based Authentication29m 18s