Back to homepage
Config Lab CCNA Vol 2 Part 2
Config Lab: DHCP Snooping 2
Dynamic Host Configuration Protocol (DHCP), like many network protocols, can be used as part of a cybersecurity attack. DHCP Snooping, a LAN switch feature, monitors DHCP messages flowing through the switch, filtering messages based on a set of rules. InConfig Lab: DHCP Snooping 1
The Dynamic Host Configuration Protocol (DHCP) protocol allows DHCP Clients to lease an IP address from a DHCP server. Simple enough. However, the protocol itself is open to various cybersecurity attacks. The LAN switch DHCP Snooping feature can monitor DHCPConfig Lab: Router as DHCP Client
While most router interfaces use configured IP addresses, in some cases, a design calls for the router to dynamically learn an interface IP address. In those cases, routers can be configured to act as a DHCP client. In many ofConfig Lab: DHCP Relay
Most DHCP servers sit in a centralized location. To make that work, routers need to participate in the DHCP process to a small degree using a feature called the DHCP Relay Agent. For this lab, you think about a classicConfig Lab: Basic Port Security 4
The Cisco switch Port Security feature lets the switch monitor incoming frames, look at the source MAC address, and determine whether frames with that source address should or should not be allowed into the switch. As usual for these config labs, thisConfig Lab: Basic Port Security 3
Sometimes, #CCNA studiers get bogged down with port security, focusing on all those little optional configuration settings. But what of the main feature: securing the port? This latest lab revisits the big ideas of what a switch does using portConfig Lab: Basic Port Security 2
Quick, can you name all the small options available with Cisco’s port security feature on Catalyst IOS images? Most of us can't, unless we're in the middle of studying for CCENT, CCNA, or CCNP R&S SWITCH. But this blog isConfig Lab: Basic Port Security 1
Cisco’s Port Security feature just happens to be one of those switch features that can confuse people until they’ve configured and tested it a few times. One challenge comes from the fact that you can enable port security with oneAnswers: Protecting CLI Access 2
This lab was pretty direct: configure an ACL and use to to protect CLI access rather than filter packets being routed by the router. You know the drill – read lab, do lab, check here.