



This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site. What steps are required to configure switch security?.What are best practices for switch security?.What mitigation tools could be used on a Cisco switch to prevent or react to a security attack?.What are some common security attacks that affect switches?.What steps are required to configure a switch for SSH access?.What tools can be used to troubleshoot a Layer 1 or 2 problem?.What type of customization can be applied to a switch port?.What functionality is available once a switch has an IP address and default gateway?.What interface is used to apply an IP address to a Cisco switch?.What are the steps taken to configure a Cisco switch with an IP address, subnet mask, and default gateway?.How might the switch LEDs help with troubleshooting?.What is the function of the boot loader if the operating system is corrupt or missing?.What are the steps a switch takes after power is applied?.Upon completion of this chapter, you will be able to answer the following questions:
