The recommended approach is to move every unused port into an unused (parking) VLAN that does not traverse any trunk links and then administratively shut the port. This prevents a rogue device from gaining access via default VLAN 1, which carries control protocols such as CDP, STP, VTP, and others. Leaving the port in VLAN 1, making it a dynamic trunk, or enabling PortFast on VLAN 1 all expose the network to potential attacks or misconfigurations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a VLAN and why do we use it for security?
Open an interactive chat with Bash
What are control protocols and why should they be protected?
Open an interactive chat with Bash
What is the best way to handle unused switch ports?
Open an interactive chat with Bash
Cisco CCNA 200-301
Network Access
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access