FALL 2021 Caution: This is a hands-on exercise which requires you to submit both the experimentation file (your GNS3 file) and the written report. No two student should have identical report, and result, as this will be heavily penalized.
Late submission will be penalized.
Cuing from Phase-2 of the lab 03 exercise, design and implement a content addressable memory table flooding attack (MAC flooding attack). You can use a simple design, or a complex design. The choice is yours to decide. However, the steps followed to conduct the attack on the design MUST be clearly stated.
Implement a security against MAC flooding attack, on how to prevent this type of attack. The steps followed should be clearly articulated as well.