From the course: Cisco CCNP Enterprise: ENCOR v1.1 (350-401) Cert Prep
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
CoPP Configuration
From the course: Cisco CCNP Enterprise: ENCOR v1.1 (350-401) Cert Prep
CoPP Configuration
- [Instructor] When configuring control plane policing, we'll go through four main steps. First, we'll want to create an ACL to identify our traffic. And then we'll want to create a class map to classify the traffic that matches the ACL. Then we'll want to create a policy map to define the action that we want taken for the traffic named in the class map. And finally, we'll use a service policy statement to apply everything to the control plane interface. Let's connect to a live interface and see how we can do that. Here we're connected into a very simple topology. I have a single PC connected to a single router, and that's it. And the way I'm going to demonstrate control plane policing, first thing I'm going to do is I'm going to start a continuous ping from this host PC over to my router at 192.168.0.1. I can use the keyword repeat, followed by a really large number, and that will essentially give me a continuous ping.…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
-
(Locked)
Network security1m 13s
-
(Locked)
Privilege-level passwords11m 3s
-
(Locked)
Line passwords7m 23s
-
(Locked)
AAA with a local database12m 33s
-
(Locked)
Standard access control list (ACL) Configuration8m 21s
-
(Locked)
Extended numbered ACL configuration10m 22s
-
(Locked)
Extended named ACL configuration10m 34s
-
ACL considerations5m 24s
-
(Locked)
Control Plane Policing (CoPP) Theory4m 1s
-
(Locked)
CoPP Configuration9m 52s
-
(Locked)
Overview of Extensible Authentication Protocol (EAP)10m 41s
-
(Locked)
Understanding the EAPOL 4-way handshake4m 33s
-
(Locked)
EAP configuration12m 12s
-
(Locked)
Overview of WebAuth6m 29s
-
(Locked)
WebAuth configuration6m 58s
-
(Locked)
Pre-shared key (PSK) theory4m 18s
-
(Locked)
PSK configuration4m 33s
-
(Locked)
Cyber threat defense (CTD)11m 9s
-
(Locked)
Endpoint hardening7m 1s
-
Next-generation firewall (NGFW)5m 10s
-
(Locked)
Cisco TrustSec5m 49s
-
(Locked)
Media access control security (MACsec)5m 38s
-
(Locked)
Network access control (NAC) with 802.1X6m 22s
-
(Locked)
MAC authentication nypass (MAB)4m 25s
-
(Locked)
Web authentication (WebAuth)5m 23s
-
(Locked)
-
-
-