• Online, Self-Paced
Course Description

Explore the use of Storm Control on a Cisco switch, the Layer 2 threat it prevents, and how to configure and verify it. Discover port-based authentication, including its requirements, usage, and configuration.

Learning Objectives

SWITCH 2.0 : Storm Control and Port-Based Authentication

  • describe Storm Control on a Cisco switch, the Layer 2 threat it prevents, and configure and verify Storm Control
  • describe port-based authentication, including its requirements, usage, and configuration

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Network Services