CCNA 6.2: Describe common access layer threat mitigation techniques

Overview: Common access layer threats include unauthorized clients connecting to a LAN, rogue DHCP servers and VLAN hopping by way of double tagging. 802.1x, DHCP snooping and Nondefault native VLAN are techniques to mitigate access layer types of vulnerabilities.   Study Notes: 6.2.a 802.1x A client-server-based access control and authentication protocol preventing unauthorized clients from […]

CCNA 1.5: Compare and contrast collapsed core and three-tier architectures

Overview: The collapsed core architecture and the three-tier architecture are design approaches, not physical separations.  It’s a way of thinking about the network, not a way of viewing actual network devices.   Study Notes: Collapsed core Core and Distribution layers are combined as a single layer The collapsed core devices must be capable of core […]

s2Member®