Discover Storm Control and how it can be used to prevent broadcast attacks and use port security to link ports to MAC addresses to prevent unauthorized hardware on a network.
Learning Objectives
{"identify storm-control command options","identify storm control thresholds","identify the commands to set the broadcast threshold"}