Connect Study Plan to Blog Content

Refine your search based on book part and/or chapter, along with content type, like Config Labs or Q&A.

The post listing below updates instantly after you check a box.

Click [+] to expand the lists to the right.

Books, Parts and Chapters

Lab and Question Post Types

Advanced Search Results …

IP uses Address Resolution Protocol (ARP) to discover the MAC address used by other hosts in the same subnet. Unfortunately, cybersecurity attacks often use legitimate protocols in…
Dynamic Host Configuration Protocol (DHCP), like many network protocols, can be used as part of a cybersecurity attack. DHCP Snooping, a LAN switch feature, monitors DHCP messages…
The Dynamic Host Configuration Protocol (DHCP) protocol allows DHCP Clients to lease an IP address from a DHCP server. Simple enough. However, the protocol itself is open…
While most router interfaces use configured IP addresses, in some cases, a design calls for the router to dynamically learn an interface IP address. In those cases,…
Most DHCP servers sit in a centralized location. To make that work, routers need to participate in the DHCP process to a small degree using a feature…
The Cisco switch Port Security feature lets the switch monitor incoming frames, look at the source MAC address, and determine whether frames with that source address should…
Sometimes, #CCNA studiers get bogged down with port security, focusing on all those little optional configuration settings. But what of the main feature: securing the port? This…
Quick, can you name all the small options available with Cisco’s port security feature on Catalyst IOS images? Most of us can't, unless we're in the middle…
Cisco’s Port Security feature just happens to be one of those switch features that can confuse people until they’ve configured and tested it a few times. One…