: Configure Filtering on a Switch
Upon completion of this Module, you will be able to perform tasks related to:
Introduction to Layer 2 Attacks
MAC Address, ARP, and DHCP Vulnerabilities
VLAN Vulnerabilities
Spanning-Tree Protocol Vulnerabilities



Close Window
All contents copyright ©2001-2005 Cisco Systems, Inc. All rights reserved.