Soumettre la recherche
Mettre en ligne
CCNA Lab 2-Configuring a Switch Part II
•
5 j'aime
•
1,396 vues
Amir Jafari
Suivre
Cisco CCNA Routing and Switching 200-120 Configuring a Switch Part II
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 10
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
Amir Jafari
CCNA Lab 3-VLAN Configuration on Switch
CCNA Lab 3-VLAN Configuration on Switch
Amir Jafari
CCNA Lab 1-Configuring a Switch Part I
CCNA Lab 1-Configuring a Switch Part I
Amir Jafari
CCNA-LAB-GUIDE-V3_LAST-ADDITION (4).pdf
CCNA-LAB-GUIDE-V3_LAST-ADDITION (4).pdf
poojaswami31
Spanning Tree Protocol Cheat Sheet
Spanning Tree Protocol Cheat Sheet
Prasanna Shanmugasundaram
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guide
IT Tech
MikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port Knocking
Akbar Azwir, MM, PMP, PMI-SP, PSM I, CISSP
6.5.1.2 packet tracer layer 2 security instructor
6.5.1.2 packet tracer layer 2 security instructor
Salem Trabelsi
Recommandé
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
Amir Jafari
CCNA Lab 3-VLAN Configuration on Switch
CCNA Lab 3-VLAN Configuration on Switch
Amir Jafari
CCNA Lab 1-Configuring a Switch Part I
CCNA Lab 1-Configuring a Switch Part I
Amir Jafari
CCNA-LAB-GUIDE-V3_LAST-ADDITION (4).pdf
CCNA-LAB-GUIDE-V3_LAST-ADDITION (4).pdf
poojaswami31
Spanning Tree Protocol Cheat Sheet
Spanning Tree Protocol Cheat Sheet
Prasanna Shanmugasundaram
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guide
IT Tech
MikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port Knocking
Akbar Azwir, MM, PMP, PMI-SP, PSM I, CISSP
6.5.1.2 packet tracer layer 2 security instructor
6.5.1.2 packet tracer layer 2 security instructor
Salem Trabelsi
Ccnp3 lab 3_4_en
Ccnp3 lab 3_4_en
Omar Herrera
CCNA Lab Guide
CCNA Lab Guide
Salachudin Emir
6.5.1.3 packet tracer layer 2 vlan security instructor
6.5.1.3 packet tracer layer 2 vlan security instructor
Salem Trabelsi
Airheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.x
Aruba, a Hewlett Packard Enterprise company
HSRP ccna
HSRP ccna
MohamedJafar5
Linux wireless kickstarter Guide
Linux wireless kickstarter Guide
Chaitanya Tata, PMP
VTP
VTP
Haidar-Mohammed
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Aruba, a Hewlett Packard Enterprise company
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5 final
KwonSun Bae
CCNA3 Verson6 Chapter4
CCNA3 Verson6 Chapter4
Chaing Ravuth
EMEA Airheads - What does AirMatch do differently?v2
EMEA Airheads - What does AirMatch do differently?v2
Aruba, a Hewlett Packard Enterprise company
Aruba instant 6.4.0.2 4.1 user guide
Aruba instant 6.4.0.2 4.1 user guide
Aruba, a Hewlett Packard Enterprise company
Basic ASA Configuration,NAT in ASA Firewall
Basic ASA Configuration,NAT in ASA Firewall
NetProtocol Xpert
IOS Cisco - Cheat sheets
IOS Cisco - Cheat sheets
Alejandro Marin
Ccna Commands In 10 Minutes
Ccna Commands In 10 Minutes
CCNAResources
Cisco ospf
Cisco ospf
sarasanandam
Policy Based Routing (PBR)
Policy Based Routing (PBR)
KHNOG
CCNP Switching Chapter 5
CCNP Switching Chapter 5
Chaing Ravuth
EMEA Airheads - Configuring different APIs in Aruba 8.x
EMEA Airheads - Configuring different APIs in Aruba 8.x
Aruba, a Hewlett Packard Enterprise company
EMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP Deployment
Aruba, a Hewlett Packard Enterprise company
CCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN Routing
Amir Jafari
Cisco CCNA v5 Lab
Cisco CCNA v5 Lab
ant09_sain
Contenu connexe
Tendances
Ccnp3 lab 3_4_en
Ccnp3 lab 3_4_en
Omar Herrera
CCNA Lab Guide
CCNA Lab Guide
Salachudin Emir
6.5.1.3 packet tracer layer 2 vlan security instructor
6.5.1.3 packet tracer layer 2 vlan security instructor
Salem Trabelsi
Airheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.x
Aruba, a Hewlett Packard Enterprise company
HSRP ccna
HSRP ccna
MohamedJafar5
Linux wireless kickstarter Guide
Linux wireless kickstarter Guide
Chaitanya Tata, PMP
VTP
VTP
Haidar-Mohammed
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Aruba, a Hewlett Packard Enterprise company
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5 final
KwonSun Bae
CCNA3 Verson6 Chapter4
CCNA3 Verson6 Chapter4
Chaing Ravuth
EMEA Airheads - What does AirMatch do differently?v2
EMEA Airheads - What does AirMatch do differently?v2
Aruba, a Hewlett Packard Enterprise company
Aruba instant 6.4.0.2 4.1 user guide
Aruba instant 6.4.0.2 4.1 user guide
Aruba, a Hewlett Packard Enterprise company
Basic ASA Configuration,NAT in ASA Firewall
Basic ASA Configuration,NAT in ASA Firewall
NetProtocol Xpert
IOS Cisco - Cheat sheets
IOS Cisco - Cheat sheets
Alejandro Marin
Ccna Commands In 10 Minutes
Ccna Commands In 10 Minutes
CCNAResources
Cisco ospf
Cisco ospf
sarasanandam
Policy Based Routing (PBR)
Policy Based Routing (PBR)
KHNOG
CCNP Switching Chapter 5
CCNP Switching Chapter 5
Chaing Ravuth
EMEA Airheads - Configuring different APIs in Aruba 8.x
EMEA Airheads - Configuring different APIs in Aruba 8.x
Aruba, a Hewlett Packard Enterprise company
EMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP Deployment
Aruba, a Hewlett Packard Enterprise company
Tendances
(20)
Ccnp3 lab 3_4_en
Ccnp3 lab 3_4_en
CCNA Lab Guide
CCNA Lab Guide
6.5.1.3 packet tracer layer 2 vlan security instructor
6.5.1.3 packet tracer layer 2 vlan security instructor
Airheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.x
HSRP ccna
HSRP ccna
Linux wireless kickstarter Guide
Linux wireless kickstarter Guide
VTP
VTP
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5 final
CCNA3 Verson6 Chapter4
CCNA3 Verson6 Chapter4
EMEA Airheads - What does AirMatch do differently?v2
EMEA Airheads - What does AirMatch do differently?v2
Aruba instant 6.4.0.2 4.1 user guide
Aruba instant 6.4.0.2 4.1 user guide
Basic ASA Configuration,NAT in ASA Firewall
Basic ASA Configuration,NAT in ASA Firewall
IOS Cisco - Cheat sheets
IOS Cisco - Cheat sheets
Ccna Commands In 10 Minutes
Ccna Commands In 10 Minutes
Cisco ospf
Cisco ospf
Policy Based Routing (PBR)
Policy Based Routing (PBR)
CCNP Switching Chapter 5
CCNP Switching Chapter 5
EMEA Airheads - Configuring different APIs in Aruba 8.x
EMEA Airheads - Configuring different APIs in Aruba 8.x
EMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP Deployment
En vedette
CCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN Routing
Amir Jafari
Cisco CCNA v5 Lab
Cisco CCNA v5 Lab
ant09_sain
Vlans
Vlans
1 2d
Smart powetr grids
Smart powetr grids
Amir Jafari
Designing Clocked Synchronous State Machine
Designing Clocked Synchronous State Machine
Abhilash Nair
CCNA- part 9 vlan
CCNA- part 9 vlan
Sandeep Sharma IIMK Smart City,IoT,Bigdata,Cloud,BI,DW
Ccna 4 final lab switchi
Ccna 4 final lab switchi
Leandro Uglar
CCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network Associate
Amir Jafari
CCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking Models
Amir Jafari
234821765 ccna-virtual-lab
234821765 ccna-virtual-lab
ITALTEL S.A.C
Convolutional Codes And Their Decoding
Convolutional Codes And Their Decoding
Kakali Saharia
Lab can ban ccna
Lab can ban ccna
Nguyen Huu Thien An
Sequential circuits in digital logic design
Sequential circuits in digital logic design
Nallapati Anindra
Sequential Logic Circuit
Sequential Logic Circuit
Ramasubbu .P
50400699 cisco-certified-network-administrator
50400699 cisco-certified-network-administrator
Naresh Gotad
Synchronous state machines. Moore and Mealy state machines (FSM)
Synchronous state machines. Moore and Mealy state machines (FSM)
Mumbi Chishimba
Finite State Machines
Finite State Machines
Basel Mansour
synchronous state machine design
synchronous state machine design
Adarsh Patel
Analysis of state machines
Analysis of state machines
Abhilash Nair
lab1
lab1
guest575c3e
En vedette
(20)
CCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN Routing
Cisco CCNA v5 Lab
Cisco CCNA v5 Lab
Vlans
Vlans
Smart powetr grids
Smart powetr grids
Designing Clocked Synchronous State Machine
Designing Clocked Synchronous State Machine
CCNA- part 9 vlan
CCNA- part 9 vlan
Ccna 4 final lab switchi
Ccna 4 final lab switchi
CCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network Associate
CCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking Models
234821765 ccna-virtual-lab
234821765 ccna-virtual-lab
Convolutional Codes And Their Decoding
Convolutional Codes And Their Decoding
Lab can ban ccna
Lab can ban ccna
Sequential circuits in digital logic design
Sequential circuits in digital logic design
Sequential Logic Circuit
Sequential Logic Circuit
50400699 cisco-certified-network-administrator
50400699 cisco-certified-network-administrator
Synchronous state machines. Moore and Mealy state machines (FSM)
Synchronous state machines. Moore and Mealy state machines (FSM)
Finite State Machines
Finite State Machines
synchronous state machine design
synchronous state machine design
Analysis of state machines
Analysis of state machines
lab1
lab1
Similaire à CCNA Lab 2-Configuring a Switch Part II
1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618)
Mohmed Abou Elenein Attia
Security Concerns in LANs.pptx
Security Concerns in LANs.pptx
joko
Chapter 13 : Introduction to switched networks
Chapter 13 : Introduction to switched networks
teknetir
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
galerussel59292
Cap2 configuring switch
Cap2 configuring switch
Hector Camba Lainez
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
Vuz Dở Hơi
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched Networks
Yaser Rahmati
KPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_final
Fisal Anwari
Praktikum Lab 14 - Switch Security Configuration.docx
Praktikum Lab 14 - Switch Security Configuration.docx
Ihsan Ihsan
PROYECTO VLANS
PROYECTO VLANS
rubendavidsuarez
Exercise 4c stp rapid pvst+ question
Exercise 4c stp rapid pvst+ question
sufi1248
Day 13.1..1 catalyst switch
Day 13.1..1 catalyst switch
CYBERINTELLIGENTS
Cisco systems hacking layer 2 ethernet switches
Cisco systems hacking layer 2 ethernet switches
KJ Savaliya
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Sumutiu Marius
Ccna lab manual 640 802
Ccna lab manual 640 802
manikkan
Network topology by essay corp uk
Network topology by essay corp uk
Johnsmith5188
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
ssusercbaa33
TitleABC123 Version X1Film ListPSYCH650 Version 2.docx
TitleABC123 Version X1Film ListPSYCH650 Version 2.docx
juliennehar
Hướng dẫn cài đặt switch planet layer 3
Hướng dẫn cài đặt switch planet layer 3
3c telecom
Id. 01 router (computing)
Id. 01 router (computing)
Rawa KirKuKi
Similaire à CCNA Lab 2-Configuring a Switch Part II
(20)
1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618)
Security Concerns in LANs.pptx
Security Concerns in LANs.pptx
Chapter 13 : Introduction to switched networks
Chapter 13 : Introduction to switched networks
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
Cap2 configuring switch
Cap2 configuring switch
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched Networks
KPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_final
Praktikum Lab 14 - Switch Security Configuration.docx
Praktikum Lab 14 - Switch Security Configuration.docx
PROYECTO VLANS
PROYECTO VLANS
Exercise 4c stp rapid pvst+ question
Exercise 4c stp rapid pvst+ question
Day 13.1..1 catalyst switch
Day 13.1..1 catalyst switch
Cisco systems hacking layer 2 ethernet switches
Cisco systems hacking layer 2 ethernet switches
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Ccna lab manual 640 802
Ccna lab manual 640 802
Network topology by essay corp uk
Network topology by essay corp uk
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
TitleABC123 Version X1Film ListPSYCH650 Version 2.docx
TitleABC123 Version X1Film ListPSYCH650 Version 2.docx
Hướng dẫn cài đặt switch planet layer 3
Hướng dẫn cài đặt switch planet layer 3
Id. 01 router (computing)
Id. 01 router (computing)
Plus de Amir Jafari
CCNA R&S-20-Configuring IPv4 Addresses and Routes
CCNA R&S-20-Configuring IPv4 Addresses and Routes
Amir Jafari
CCNA R&S-19-Operating Cisco Routers
CCNA R&S-19-Operating Cisco Routers
Amir Jafari
CCNA R&S-18-Analyzing Existing Subnets
CCNA R&S-18-Analyzing Existing Subnets
Amir Jafari
CCNA R&S-17-Analyzing Subnet Masks
CCNA R&S-17-Analyzing Subnet Masks
Amir Jafari
CCNA R&S-16-Analyzing Classful IPv4 Networks
CCNA R&S-16-Analyzing Classful IPv4 Networks
Amir Jafari
CCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 Subnetting
Amir Jafari
CCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol Implementation
Amir Jafari
CCNA R&S-12-Spanning Tree Protocol Concepts
CCNA R&S-12-Spanning Tree Protocol Concepts
Amir Jafari
CCNA R&S-11-Troubleshooting Ethernet LANs
CCNA R&S-11-Troubleshooting Ethernet LANs
Amir Jafari
CCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANs
Amir Jafari
CCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet Switching
Amir Jafari
CCNA R&S-06-Fundamentals of TCP-IP Transport and Applications
CCNA R&S-06-Fundamentals of TCP-IP Transport and Applications
Amir Jafari
CCCNA R&S-04-Fundamentals of WANs
CCCNA R&S-04-Fundamentals of WANs
Amir Jafari
CCCNA R&S-03-Fundamentals of Ethernet LANs
CCCNA R&S-03-Fundamentals of Ethernet LANs
Amir Jafari
Network design
Network design
Amir Jafari
CCNA Voice 640-461- Part 4 historic voice-digital connectivity-part 2
CCNA Voice 640-461- Part 4 historic voice-digital connectivity-part 2
Amir Jafari
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
Amir Jafari
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Amir Jafari
Plus de Amir Jafari
(18)
CCNA R&S-20-Configuring IPv4 Addresses and Routes
CCNA R&S-20-Configuring IPv4 Addresses and Routes
CCNA R&S-19-Operating Cisco Routers
CCNA R&S-19-Operating Cisco Routers
CCNA R&S-18-Analyzing Existing Subnets
CCNA R&S-18-Analyzing Existing Subnets
CCNA R&S-17-Analyzing Subnet Masks
CCNA R&S-17-Analyzing Subnet Masks
CCNA R&S-16-Analyzing Classful IPv4 Networks
CCNA R&S-16-Analyzing Classful IPv4 Networks
CCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-12-Spanning Tree Protocol Concepts
CCNA R&S-12-Spanning Tree Protocol Concepts
CCNA R&S-11-Troubleshooting Ethernet LANs
CCNA R&S-11-Troubleshooting Ethernet LANs
CCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-06-Fundamentals of TCP-IP Transport and Applications
CCNA R&S-06-Fundamentals of TCP-IP Transport and Applications
CCCNA R&S-04-Fundamentals of WANs
CCCNA R&S-04-Fundamentals of WANs
CCCNA R&S-03-Fundamentals of Ethernet LANs
CCCNA R&S-03-Fundamentals of Ethernet LANs
Network design
Network design
CCNA Voice 640-461- Part 4 historic voice-digital connectivity-part 2
CCNA Voice 640-461- Part 4 historic voice-digital connectivity-part 2
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Dernier
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
Sujit Pal
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
soniya singh
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
2toLead Limited
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
Dernier
(20)
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
Slack Application Development 101 Slides
Slack Application Development 101 Slides
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
CCNA Lab 2-Configuring a Switch Part II
1.
amir-jafari.com ©2015 Amir Jafari
– www.amir-Jafari.com. All rights reserved. Page 1 of 10 CCNA Lab 2: Configuring a Switch Part II
2.
amir-jafari.com ©2015 Amir Jafari
– www.amir-Jafari.com. All rights reserved. Page 2 of 10 Table of Contents Page 1- Objectives...................................................................................................................................................3 2- Scenario .....................................................................................................................................................3 3- Equipment List............................................................................................................................................3 4- Topology Diagram ......................................................................................................................................4 5-Addressing Table.........................................................................................................................................4 6-Detailed Lab Steps ......................................................................................................................................5 6-1 Part 1: Prepare the Network (Cable, Erase, and Reload the Switch)...................................................5 6-1-1- Designing and Configuration ........................................................................................................5 6-1-2- Verification ....................................................................................................................................5 6-1-3 Troubleshooting .............................................................................................................................5 6-2: Part 2: Perform Basic Device Configurations ......................................................................................5 6-2-1- Designing and Configuration ........................................................................................................5 6-2-2- Verification ....................................................................................................................................6 6-3: Part 3: Configuring Port Security .........................................................................................................6 6-3-1- Designing and Configuration ........................................................................................................6 Then connect PC2 to switch port Fast Ethernet 0/20..............................................................................7 Disconnect PC1, PC2 and connect PC1 to port Fast Ethernet 0/20. Wait for the amber link light to turn green. Once it turns green, it should almost immediately turn off...........................................................7 Note: Some IOS version may require a manual shutdown command before entering the no shutdown command.................................................................................................................................................7 6-3-2- Verification ....................................................................................................................................8 6-4: Part 4: Configure Switch to Accept Incoming SSH Connections.........................................................8 6-3-1- Designing and Configuration ........................................................................................................8 6-3-2- Verification ....................................................................................................................................9
3.
amir-jafari.com ©2015 Amir Jafari
– www.amir-Jafari.com. All rights reserved. Page 3 of 10 1- Objectives Configure basic switch port security Manage the MAC address table Configuring SSH to remotely connect to other devices 2- Scenario This lab introduces you the basic switch port security configuration and configuring the Switch to accept incoming SSH connections. 3- Equipment List Cisco Catalyst 2960 Switch with Cisco IOS Release 12.2. The Cisco implementation of SSH requires Cisco IOS Software to support RSA authentication and minimum DES encryption—a cryptographic software image. Two PCs that will run Windows XP or later
4.
amir-jafari.com ©2015 Amir Jafari
– www.amir-Jafari.com. All rights reserved. Page 4 of 10 4- Topology Diagram 5-Addressing Table Device Interface IP Address Subnet Mask Defualt Gateway PC1 NIC 172.17.99.21 255.255.255.0 172.17.99.1 PC2 NIC 172.17.99.32 255.255.255.0 172.17.99.1 S1 VLAN 1 172.17.99.11 255.255.255.0 172.17.99.1
5.
amir-jafari.com ©2015 Amir Jafari
– www.amir-Jafari.com. All rights reserved. Page 5 of 10 6-Detailed Lab Steps 6-1 Part 1: Prepare the Network (Cable, Erase, and Reload the Switch) 6-1-1- Designing and Configuration Step 1: Cable a network Cable a network that is similar to the one in the topology diagram. Create a console connection to the switch. Step 2: Clear the configuration on the switch Clear the configuration on the switch based on the “CCNA Lab 1-Configuring a Switch Part I”, Detailed Lab Steps, Part 1. 6-1-2- Verification Do the verification based on the “CCNA Lab 1-Configuring a Switch Part I”, Detailed Lab Steps, Part 1. 6-1-3 Troubleshooting Do the troubleshooting based on the “CCNA Lab 1-Configuring a Switch Part I”, Detailed Lab Steps, Part 1. 6-2: Part 2: Perform Basic Device Configurations 6-2-1- Designing and Configuration Perform Basic Device Configurations based on the “CCNA Lab 1-Configuring a Switch Part I”, Detailed Lab Steps, Part 2.
6.
amir-jafari.com ©2015 Amir Jafari
– www.amir-Jafari.com. All rights reserved. Page 6 of 10 6-2-2- Verification Do the verification based on the “CCNA Lab 1-Configuring a Switch Part I”, Detailed Lab Steps, Detailed Lab Steps, Part 2. 6-3: Part 3: Configuring Port Security 6-3-1- Designing and Configuration Step 1: Configure hosts Set the IP address, subnet mask and default gateway for PC1 and PC2 based on the address table. Do not connect PC2 to the switch yet. Step 2: Configure port security on an access port (Learn the MAC addresses dynamically) Configure switch port Fast Ethernet 0/18 to accept only two devices, to learn the MAC addresses of those devices dynamically, and to block traffic from invalid hosts if a violation occurs. S1(config)#interface fastethernet 0/18 S1(config-if)#switchport mode access S1(config-if)#switchport port-security S1(config-if)#switchport port-security maximum 2 S1(config-if)#switchport port-security mac-address sticky S1(config-if)#switchport port-security violation restrict S1(config-if)#exit Step 3: Configure port security on an access port (Set a specific secure MAC address) Configure switch port Fast Ethernet 0/20 to accept only one device, to Sets a specific secure MAC address, and to block traffic from invalid hosts if a violation occurs. Default Port Security Configuration is as follow:
7.
amir-jafari.com ©2015 Amir Jafari
– www.amir-Jafari.com. All rights reserved. Page 7 of 10 Feature Deafault Setting Port Security Disable Maximum number of secure MAC address 1 Violation mode Shutdown So when you do not set the violation and maximum MAC address, the default setting will be considered. S1(config)#interface fastethernet 0/20 S1(config-if)#switchport mode access S1(config-if)#switchport port-security S1(config-if)#switchport port-security mac-address mac-address (PC2 MAC address) S1(config-if)#exit Then connect PC2 to switch port Fast Ethernet 0/20. Step 4: Introduce a rogue host Disconnect PC1, PC2 and connect PC1 to port Fast Ethernet 0/20. Wait for the amber link light to turn green. Once it turns green, it should almost immediately turn off. Step 5: Reactivate the port If a security violation occurs and the port is shut down, you can use the no shutdown command to reactivate it. However, as long as the rogue host is attached to Fast Ethernet 0/20, any traffic from the host disables the port. Reconnect PC2 to Fast Ethernet 0/20, and enter the following commands on the switch: S1# configure terminal S1(config)#interface fastethernet 0/20 S1(config-if)# no shutdown S1(config-if)#exit Note: Some IOS version may require a manual shutdown command before entering the no shutdown command.
8.
amir-jafari.com ©2015 Amir Jafari
– www.amir-Jafari.com. All rights reserved. Page 8 of 10 6-3-2- Verification Step 1: Verify the results Show the port security settings. S1#show port-security Step 2: Examine the running configuration file With sticky secure MAC addresses feature, port security learns the MAC addresses off each port and stores those in the port security configuration (in the running-config file). Port security does not save the configuration of the sticky addresses, so use the copy running-config startup-config command if desired. S1#show running-config Step 3: Determine the MAC addresses that the switch has learned Any MAC addresses associated with a port on which port security is enabled show up as static MAC addresses. S1#show mac-address-table 6-4: Part 4: Configure Switch to Accept Incoming SSH Connections 6-3-1- Designing and Configuration Step 1: Creates a locally significant username/ password combination To work, SSH requires a local username database. S1(config)#username cisco password class Step 2: Configure the vty lines to use usernames Tell Switch to require SSH connections to use a locally configured username/password pair.
9.
amir-jafari.com ©2015 Amir Jafari
– www.amir-Jafari.com. All rights reserved. Page 9 of 10 S1(config)#line vty 0 15 S1(config-line)#login local S1(config-line)#exit Step 3: Creates a host domain for the Switch To work, SSH requires a local IP domain. S1(config)#ip domain-name cisco.com Step 4: Create the encryption keys Enables the SSH server for local and remote authentication on the switch and generates an RSA key pair. S1(config)#crypto key generate rsa How many bits in the modulus [512]: 1024 Step 5: Enable SSH Version 2 S1(config)#ip ssh version 2 Step 6: Disable support for inbound Telnet connections The switch supports both Telnet and SSH on the vty lines, but you can disable Telnet for tighter security. S1(config)#line vty 0 15 S1(config-line)#transport input ssh 6-3-2- Verification Step 1: Examine the running configuration file S1#show running-config Step 2: The status information about the SSH server The show ip ssh command lists status information about the SSH server itself. S1#show ip ssh
10.
amir-jafari.com ©2015 Amir Jafari
– www.amir-Jafari.com. All rights reserved. Page 10 of 10 Step 3: Information about each SSH client The show ssh command then lists information about each SSH client currently connected into the switch. S1#show ssh Step 4: Displays who is connected remotely to Switch This command lists all users logged in to the Swtich, including users at the console, and those connecting using both Telnet and SSH. S1#show users Step 5: Disconnects the remote user connected to Swtich on line x The line number is listed in the output gained from the show users command. S1#clear line x
Télécharger maintenant