I am looking at a 6500 configuration (IOS 12.2(14)), and I am trying to determine exactly what is going on and more importantly, if the switchport configurations for the interfaces are SECURED properly. The following lines are configured on the interfaces:
My understanding is that because of the "switchport mode access" line, that the interface is nontrunking, nontagged, which I thought was not a good idea. If that is the case, what exposures are there. Also, should 802.1Q tunneling be done instead, and if so, are there some limitations as to why 802.1Q tunneling may not be done in this instance?
[toc:faq]The ProblemOn traditional switches whenever we have a trunk
interface we use the VLAN tag to demultiplex the VLANs. The switch needs
to determine which MAC Address table to look in for a forwarding
decision. To do this we require the switch to do...
[toc:faq]Introduction:Netdr is a tool available on a RSP720, Sup720 or
Sup32 that allows one to capture packets on the RP or SP inband. The
netdr command can be used to capture both Tx and Rx packets in the
software switching path. This is not a substitut...
IntroductionOSPF, being a link-state protocol, allows for every router
in the network to know of every link and OSPF speaker in the entire
network. From this picture each router independently runs the Shortest
Path First (SPF) algorithm to determine the b...