L

L2F (Layer 2 Forwarding), 276-277 L2TP (Layer 2 Tunneling Protocol), 276-277 lab exam, 633-635

FAQs, 635-637 sample, 639-664 Land.C attacks, 420 Layer 2 security, 15

CAM table overflow, 199-202 DHCP starvation attacks, 207-208 MAC spoofing attacks, 205-207 STP manipulation attacks, 204 VLAN hopping, 202-203 layers of OSI reference model application layer, 18 data link layer, 15 network layer, 16, 22-23, 27-30 physical layer, 14 presentation layer, 17-18 session layer, 17 transport layer, 17 LCP, 78

LDAP (Lightweight Directory Access

Protocol), 135 Learning state (spanning tree), 24 leases (DHCP), viewing, 40 link-state protocols, OSPF, 61-70 media types, 65

Listening state (spanning tree), 24 LLC sublayer, 15 loading configuration files, 165 Local Preference attribute (BGP), 73 log files (PIX Firewall), troubleshooting, 374-375

logging console debug command, 175 loopback interfaces, 431

loop prevention, split horizon, 53 lost passwords, recovering, 182-187 LSAs (link-state advertisements), 63

0 0

Post a comment