14.9.11 Packet Tracer | - Layer 2 Vlan Security

Let’s break down what this lab teaches and why it matters in the real world. Imagine you are responsible for a corporate network. Users are in VLAN 10 (Employees) and VLAN 20 (Guests). The lab presents a simple topology: one multilayer switch (distribution), one layer 2 switch (access), and a few PCs.

ip dhcp snooping ip dhcp snooping vlan 10,20 interface g0/1 ip dhcp snooping trust interface range fa0/1-24 ip dhcp snooping limit rate 10 no ip dhcp snooping trust Now, only the uplink port can send DHCP Offer/ACK messages. Any rogue server on an access port will be ignored. 14.9.11 packet tracer - layer 2 vlan security

On the access ports connecting to end devices (Fa0/1, Fa0/2, etc.), you need to lock down the MAC addresses. Let’s break down what this lab teaches and

That’s where comes in. It’s the often-overlooked foundation of network defense. The lab presents a simple topology: one multilayer

Take the time to run this lab. Break it on purpose. Watch the show port-security , show dhcp snooping binding , and show interfaces status err-disabled outputs.

Move the native VLAN to an unused, "dead-end" VLAN.

The four techniques in form the backbone of the Cisco Cyber Threat Defense model:


Projekt współfinansowany ze środków Unii Europejskiej w ramach Europejskiego Funduszu Rozwoju Regionalnego
Dotacje na innowacje - Inwestujemy w Waszą przyszłość
14.9.11 packet tracer - layer 2 vlan security
foo