Back to homepage

200-301 V2 Ch08: DHCP Snooping & DAI

Config Lab: DAI 1

Config Lab: DAI 1

🕔17:05, 8.Oct 2021 IP uses Address Resolution Protocol (ARP) to discover the MAC address used by other hosts in the same subnet. Unfortunately, cybersecurity attacks often use legitimate protocols in unintended ways to form an attack, and ARP is no exception. To help Read Full Article
Config Lab: DHCP Snooping 2

Config Lab: DHCP Snooping 2

🕔15:05, 8.Oct 2021 Dynamic Host Configuration Protocol (DHCP), like many network protocols, can be used as part of a cybersecurity attack. DHCP Snooping, a LAN switch feature, monitors DHCP messages flowing through the switch, filtering messages based on a set of rules. In Read Full Article
Config Lab: DHCP Snooping 1

Config Lab: DHCP Snooping 1

🕔13:05, 8.Oct 2021 The Dynamic Host Configuration Protocol (DHCP) protocol allows DHCP Clients to lease an IP address from a DHCP server. Simple enough. However, the protocol itself is open to various cybersecurity attacks. The LAN switch DHCP Snooping feature can monitor DHCP Read Full Article
CCNA Packet Tracer Labs – CCNA Vol 2, Chapter 8

CCNA Packet Tracer Labs – CCNA Vol 2, Chapter 8

🕔09:15, 25.Jun 2020

One reason we created these Packet Tracer files to match the book examples is that PT does not always work well with a particular command or feature. You can practice the topics in the CCNA 200-301 OCG Volume 2 Chapter

Read Full Article

Search

Categories