SWITCH 2.0 : L2 Attacks and Port Security


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Explore Layer 2 attacks, security best practices, and how to identify some common Layer 2 attacks. Examine port security on a Cisco switch, how to configure it, and how to verify the configuration. This course can be used to prepare for the 300-115: Implementing Cisco IP Switched Networks 2.0 certification exam.



Expected Duration (hours)
0.8

Lesson Objectives

SWITCH 2.0 : L2 Attacks and Port Security

  • identify the type of Layer 2 attack that uses root guard and BPDU guar to mitigate attacks
  • recognize Layer 2 attacks
  • specify the Layer 2 attack type known as a ‘double-tagging attack’
  • identify considerations for MAC address flooding attack configurations
  • identify the port security violation in a given scenario
  • identify the syntax used to provide information on protected switch ports and determine the result of a violation
  • recognize the syntax used in interface configuration mode to configure a port for multiple MAC addresses
  • recognize the syntax used to configure a port to use its first learned MAC address
  • Course Number:
    it_ccnpstv_13_04_enus

    Expertise Level
    Expert