Antivirus, Application security, Authentication, backdoors, Biometrics, Current threats, cybersecurity, Data breach, Data-security, Digital certificates, Disaster recovery planning, Encryption, filtering, Firewall, Firewalls, Forensics, Hacking, Identity & Access Management, Identity management, Incident response, Information security, Intrusion management, ISA Server, IT security, malware, McAfee, Microsoft patches, Microsoft Security, Password, Patch management, patching, PEN testing, Platform Security, Risk management, Secure Coding, Security Program Management, Security tokens, Single sign-on, Spyware, SSL, SSL/TLS, Symantec, Trojans, User Permissions, Veritas, Viruses, vulnerability management, Web security, Windows Security, worms VIEW ALL TAGS
How do I convert a layer 3 switch to a layer 2 switch? Can I just configure the layer 3 switch as if it were a layer 2 switch?
Hi guys, I have a cisco 3750 series L3 switch. It can currently handle 3GB of L2 traffic with no problem, but when faced with 40MB of L3 traffic, CPU utilization shot so high that I can't even telnet to the switch. Could anyone enlighten me please? Thanks in advance!!
Here is the network scenario: I have two T1's coming into our main building. One is a p2p T1 circuit to a remote office. The other is a basic T1 circuit for Internet connectivity. The far end of the p2p is in the 192.168.3.0 255.255.255.0 network. The local router is an Adtran with an IP of...