Course Description
Explore the use of Storm Control on a Cisco switch, the Layer 2 threat it prevents, and how to configure and verify it. Discover port-based authentication, including its requirements, usage, and configuration.
Learning Objectives
SWITCH 2.0 : Storm Control and Port-Based Authentication
- describe Storm Control on a Cisco switch, the Layer 2 threat it prevents, and configure and verify Storm Control
- describe port-based authentication, including its requirements, usage, and configuration