EtherChannel and Network Protocols

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/18

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts related to EtherChannel, network protocols, and security measures in Ethernet networks.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

19 Terms

1
New cards

EtherChannel

A link aggregation technology that groups multiple physical Ethernet links together into one single logical link, increasing bandwidth and providing redundancy.

2
New cards

Port Channel

The resulting virtual interface created when multiple physical interfaces are bundled together in an EtherChannel.

3
New cards

PAgP

Port Aggregation Protocol, a Cisco proprietary protocol that helps in the automatic creation of EtherChannel links by negotiating with adjoining switches.

4
New cards

LACP

Link Aggregation Control Protocol, an IEEE standard (802.3ad) that allows several physical ports to be bundled together to form a single logical channel.

5
New cards

Load Balancing in EtherChannel

The distribution of traffic among multiple links that are part of the same EtherChannel to improve overall throughput.

6
New cards

Redundancy

A system design that ensures continuity of service by providing backup components or paths, preventing service disruption in case of failure.

7
New cards

AutoNegotiation Protocols

Protocols such as PAgP and LACP that facilitate the negotiation of EtherChannel parameters between switches.

8
New cards

MAC Address Table Overflow

A type of attack that floods a switch with fake MAC addresses, causing it to fail to properly direct traffic.

9
New cards

Dynamic ARP Inspection (DAI)

A security feature that helps prevent ARP spoofing and ARP poisoning attacks by ensuring that only valid ARP requests and responses are relayed.

10
New cards

DHCP Snooping

A security feature that prevents DHCP spoofing by filtering DHCP messages on untrusted ports and maintaining a DHCP binding table.

11
New cards

Port Security

A feature that restricts the number of valid MAC addresses on a port to mitigate MAC address table overflow attacks.

12
New cards

VLAN Hopping Attack

An attack that enables an attacker to send traffic from one VLAN to another without a router by manipulating trunking protocols.

13
New cards

HSRP (Hot Standby Router Protocol)

A Cisco proprietary FHRP designed to allow transparent failover of a first-hop IPv4 device in case of router failure.

14
New cards

First Hop Redundancy

A method of providing alternate default gateways in switched networks to prevent the loss of connectivity if the primary gateway fails.

15
New cards

Spanning Tree Protocol (STP)

A network protocol that ensures a loop-free topology in Ethernet networks by blocking redundant paths.

16
New cards

Rogue DHCP Server

An unauthorized DHCP server on a network that may provide incorrect IP configuration and lead to man-in-the-middle attacks.

17
New cards

Access Control Lists (ACLs)

A set of rules that control network traffic and reduce the exposure of resources to unauthorized users.

18
New cards

802.1X

A network protocol for port-based network access control, enabling authentication before devices can access the network.

19
New cards

ICMPv6

Internet Control Message Protocol for IPv6, used for sending error messages and operational queries.