This is a dedicated watch page for a single video.
Steve is a network administrator aiming to eliminate unencrypted traffic within his company's network. To achieve this, he establishes a SPAN port to capture all traffic to the datacenter. During his analysis, Steve identifies unencrypted traffic on port UDP 161. What protocol is associated with port UDP 161, and how can Steve secure that traffic?