Keep the Network Secured Within
In response to my CCNA journey in section of Security Fundamentals, I set up a simple topology on Packet Tracer and make sure I can ping the router from the PC0 but not from PC1. I assume the PC1 as a Kali Linux user as someone who would do a mac overflow attack in the switch. Port-security is the countermeasure for MAC address table overflow attack. The administrator can limit the number of mac addresses allowed per ports on the switch, thus protects the network from the said attack.
(pkt Here)
Let’s use the bad PC user
If the device or host that isn’t manually configured or have sticked it’s MAC address to the port security configuration, then it won’t be able to attack the network.
For the switch to come back up..
Using the ‘shutdown’ or ‘sh’ and ‘no shutdown’ or ‘no sh’ commands under the interface f0/1 will make the port transition from error-disabled state.