• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/7

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

7 Cards in this Set

  • Front
  • Back
When is unicast flooding normal?
When a MAC address is unknown on a switch.
When is unicast flooding abnormal?
When the CAM table is full due to an exploit or attack.
How is excessive unicast flooding bad?
It is a bandwidth drain. It can also be exploited by someone attempting to intercept unicast communications.
What are some legitimate causes for a destination MAC to be unknown?
Asymmetric routing
Spanning tree topology changes (CAM table purged faster)
CAM table overflow
How can unicast flooding be minimized when asymmetric routing is happening?
Configure the ARP and CAM aging timers closer together.
How can unicast flooding be minimized with spanning tree?
Configure portfast on end-device ports to limit the number of TCNs sent in the STP domain.
What command displays Unicast Flood Prevention if supported by the switch?
show mac-address-table unicast-flood