Isit328 2019 PPT 05 Secure Networks
Isit328 2019 PPT 05 Secure Networks
Isit328 2019 PPT 05 Secure Networks
FE0/2 FE0/6
FE0/3 FE0/7
FE0/4 FE0/8
} This command specifies port f0/18 as the port that you want to
S1(config-if)#switchport mode access
} The MAC address learned on the port can be added to ("stuck" to) the
running configuration for that port.
© 2015 Pearson Education Ltd.
} What would you like the port to do when sensing a
security violation. You have these choices
Protect No No No No No No
} WPA2 (802.11i)
◦ 802.11 Working Group completed the 802.11i
standard (WPA2) in 2002
◦ Uses stronger security methods
} Rate limiting
◦ Used to reduce a certain type of traffic to a
reasonable amount
◦ Can frustrate attackers and legitimate users