SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
amir-jafari.com
©2015 Amir Jafari – www.amir-Jafari.com. All rights reserved. Page 1 of 10
CCNA Lab 2:
Configuring a Switch Part II
amir-jafari.com
©2015 Amir Jafari – www.amir-Jafari.com. All rights reserved. Page 2 of 10
Table of Contents Page
1- Objectives...................................................................................................................................................3
2- Scenario .....................................................................................................................................................3
3- Equipment List............................................................................................................................................3
4- Topology Diagram ......................................................................................................................................4
5-Addressing Table.........................................................................................................................................4
6-Detailed Lab Steps ......................................................................................................................................5
6-1 Part 1: Prepare the Network (Cable, Erase, and Reload the Switch)...................................................5
6-1-1- Designing and Configuration ........................................................................................................5
6-1-2- Verification ....................................................................................................................................5
6-1-3 Troubleshooting .............................................................................................................................5
6-2: Part 2: Perform Basic Device Configurations ......................................................................................5
6-2-1- Designing and Configuration ........................................................................................................5
6-2-2- Verification ....................................................................................................................................6
6-3: Part 3: Configuring Port Security .........................................................................................................6
6-3-1- Designing and Configuration ........................................................................................................6
Then connect PC2 to switch port Fast Ethernet 0/20..............................................................................7
Disconnect PC1, PC2 and connect PC1 to port Fast Ethernet 0/20. Wait for the amber link light to turn
green. Once it turns green, it should almost immediately turn off...........................................................7
Note: Some IOS version may require a manual shutdown command before entering the no shutdown
command.................................................................................................................................................7
6-3-2- Verification ....................................................................................................................................8
6-4: Part 4: Configure Switch to Accept Incoming SSH Connections.........................................................8
6-3-1- Designing and Configuration ........................................................................................................8
6-3-2- Verification ....................................................................................................................................9
amir-jafari.com
©2015 Amir Jafari – www.amir-Jafari.com. All rights reserved. Page 3 of 10
1- Objectives
 Configure basic switch port security
 Manage the MAC address table
 Configuring SSH to remotely connect to other devices
2- Scenario
This lab introduces you the basic switch port security configuration and configuring the Switch to accept
incoming SSH connections.
3- Equipment List
 Cisco Catalyst 2960 Switch with Cisco IOS Release 12.2. The Cisco implementation of SSH
requires Cisco IOS Software to support RSA authentication and minimum DES encryption—a
cryptographic software image.
 Two PCs that will run Windows XP or later
amir-jafari.com
©2015 Amir Jafari – www.amir-Jafari.com. All rights reserved. Page 4 of 10
4- Topology Diagram
5-Addressing Table
Device Interface IP Address Subnet Mask Defualt Gateway
PC1 NIC 172.17.99.21 255.255.255.0 172.17.99.1
PC2 NIC 172.17.99.32 255.255.255.0 172.17.99.1
S1 VLAN 1 172.17.99.11 255.255.255.0 172.17.99.1
amir-jafari.com
©2015 Amir Jafari – www.amir-Jafari.com. All rights reserved. Page 5 of 10
6-Detailed Lab Steps
6-1 Part 1: Prepare the Network (Cable, Erase, and Reload the Switch)
6-1-1- Designing and Configuration
Step 1: Cable a network
Cable a network that is similar to the one in the topology diagram. Create a console connection to the
switch.
Step 2: Clear the configuration on the switch
Clear the configuration on the switch based on the “CCNA Lab 1-Configuring a Switch Part I”, Detailed
Lab Steps, Part 1.
6-1-2- Verification
Do the verification based on the “CCNA Lab 1-Configuring a Switch Part I”, Detailed Lab Steps, Part 1.
6-1-3 Troubleshooting
Do the troubleshooting based on the “CCNA Lab 1-Configuring a Switch Part I”, Detailed Lab Steps, Part
1.
6-2: Part 2: Perform Basic Device Configurations
6-2-1- Designing and Configuration
Perform Basic Device Configurations based on the “CCNA Lab 1-Configuring a Switch Part I”, Detailed
Lab Steps, Part 2.
amir-jafari.com
©2015 Amir Jafari – www.amir-Jafari.com. All rights reserved. Page 6 of 10
6-2-2- Verification
Do the verification based on the “CCNA Lab 1-Configuring a Switch Part I”, Detailed Lab Steps, Detailed
Lab Steps, Part 2.
6-3: Part 3: Configuring Port Security
6-3-1- Designing and Configuration
Step 1: Configure hosts
Set the IP address, subnet mask and default gateway for PC1 and PC2 based on the address table. Do
not connect PC2 to the switch yet.
Step 2: Configure port security on an access port (Learn the MAC addresses dynamically)
Configure switch port Fast Ethernet 0/18 to accept only two devices, to learn the MAC addresses of those
devices dynamically, and to block traffic from invalid hosts if a violation occurs.
S1(config)#interface fastethernet 0/18
S1(config-if)#switchport mode access
S1(config-if)#switchport port-security
S1(config-if)#switchport port-security maximum 2
S1(config-if)#switchport port-security mac-address sticky
S1(config-if)#switchport port-security violation restrict
S1(config-if)#exit
Step 3: Configure port security on an access port (Set a specific secure MAC address)
Configure switch port Fast Ethernet 0/20 to accept only one device, to Sets a specific secure MAC
address, and to block traffic from invalid hosts if a violation occurs. Default Port Security Configuration is
as follow:
amir-jafari.com
©2015 Amir Jafari – www.amir-Jafari.com. All rights reserved. Page 7 of 10
Feature Deafault Setting
Port Security Disable
Maximum number of secure MAC address 1
Violation mode Shutdown
So when you do not set the violation and maximum MAC address, the default setting will be considered.
S1(config)#interface fastethernet 0/20
S1(config-if)#switchport mode access
S1(config-if)#switchport port-security
S1(config-if)#switchport port-security mac-address mac-address (PC2 MAC address)
S1(config-if)#exit
Then connect PC2 to switch port Fast Ethernet 0/20.
Step 4: Introduce a rogue host
Disconnect PC1, PC2 and connect PC1 to port Fast Ethernet 0/20. Wait for the amber link light to turn
green. Once it turns green, it should almost immediately turn off.
Step 5: Reactivate the port
If a security violation occurs and the port is shut down, you can use the no shutdown command to
reactivate it. However, as long as the rogue host is attached to Fast Ethernet 0/20, any traffic from the
host disables the port. Reconnect PC2 to Fast Ethernet 0/20, and enter the following commands on the
switch:
S1# configure terminal
S1(config)#interface fastethernet 0/20
S1(config-if)# no shutdown
S1(config-if)#exit
Note: Some IOS version may require a manual shutdown command before entering the no shutdown
command.
amir-jafari.com
©2015 Amir Jafari – www.amir-Jafari.com. All rights reserved. Page 8 of 10
6-3-2- Verification
Step 1: Verify the results
Show the port security settings.
S1#show port-security
Step 2: Examine the running configuration file
With sticky secure MAC addresses feature, port security learns the MAC addresses off each port and
stores those in the port security configuration (in the running-config file). Port security does not save the
configuration of the sticky addresses, so use the copy running-config startup-config command if
desired.
S1#show running-config
Step 3: Determine the MAC addresses that the switch has learned
Any MAC addresses associated with a port on which port security is enabled show up as static MAC
addresses.
S1#show mac-address-table
6-4: Part 4: Configure Switch to Accept Incoming SSH Connections
6-3-1- Designing and Configuration
Step 1: Creates a locally significant username/ password combination
To work, SSH requires a local username database.
S1(config)#username cisco password class
Step 2: Configure the vty lines to use usernames
Tell Switch to require SSH connections to use a locally configured username/password pair.
amir-jafari.com
©2015 Amir Jafari – www.amir-Jafari.com. All rights reserved. Page 9 of 10
S1(config)#line vty 0 15
S1(config-line)#login local
S1(config-line)#exit
Step 3: Creates a host domain for the Switch
To work, SSH requires a local IP domain.
S1(config)#ip domain-name cisco.com
Step 4: Create the encryption keys
Enables the SSH server for local and remote authentication on the switch and generates an RSA key pair.
S1(config)#crypto key generate rsa
How many bits in the modulus [512]: 1024
Step 5: Enable SSH Version 2
S1(config)#ip ssh version 2
Step 6: Disable support for inbound Telnet connections
The switch supports both Telnet and SSH on the vty lines, but you can disable Telnet for tighter security.
S1(config)#line vty 0 15
S1(config-line)#transport input ssh
6-3-2- Verification
Step 1: Examine the running configuration file
S1#show running-config
Step 2: The status information about the SSH server
The show ip ssh command lists status information about the SSH server itself.
S1#show ip ssh
amir-jafari.com
©2015 Amir Jafari – www.amir-Jafari.com. All rights reserved. Page 10 of 10
Step 3: Information about each SSH client
The show ssh command then lists information about each SSH client currently connected into the switch.
S1#show ssh
Step 4: Displays who is connected remotely to Switch
This command lists all users logged in to the Swtich, including users at the console, and those connecting
using both Telnet and SSH.
S1#show users
Step 5: Disconnects the remote user connected to Swtich on line x
The line number is listed in the output gained from the show users command.
S1#clear line x

Contenu connexe

Tendances

6.5.1.3 packet tracer layer 2 vlan security instructor
6.5.1.3 packet tracer   layer 2 vlan security instructor6.5.1.3 packet tracer   layer 2 vlan security instructor
6.5.1.3 packet tracer layer 2 vlan security instructorSalem Trabelsi
 
Linux wireless kickstarter Guide
Linux wireless kickstarter GuideLinux wireless kickstarter Guide
Linux wireless kickstarter GuideChaitanya Tata, PMP
 
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 finalKwonSun Bae
 
CCNA3 Verson6 Chapter4
CCNA3 Verson6 Chapter4CCNA3 Verson6 Chapter4
CCNA3 Verson6 Chapter4Chaing Ravuth
 
Basic ASA Configuration, NAT in ASA Firewall
Basic ASA Configuration,NAT in ASA FirewallBasic ASA Configuration,NAT in ASA Firewall
Basic ASA Configuration, NAT in ASA Firewall NetProtocol Xpert
 
IOS Cisco - Cheat sheets
IOS Cisco - Cheat sheetsIOS Cisco - Cheat sheets
IOS Cisco - Cheat sheetsAlejandro Marin
 
Ccna Commands In 10 Minutes
Ccna Commands In 10 MinutesCcna Commands In 10 Minutes
Ccna Commands In 10 MinutesCCNAResources
 
Policy Based Routing (PBR)
Policy Based Routing (PBR)Policy Based Routing (PBR)
Policy Based Routing (PBR)KHNOG
 
CCNP Switching Chapter 5
CCNP Switching Chapter 5CCNP Switching Chapter 5
CCNP Switching Chapter 5Chaing Ravuth
 

Tendances (20)

Ccnp3 lab 3_4_en
Ccnp3 lab 3_4_enCcnp3 lab 3_4_en
Ccnp3 lab 3_4_en
 
CCNA Lab Guide
CCNA Lab GuideCCNA Lab Guide
CCNA Lab Guide
 
6.5.1.3 packet tracer layer 2 vlan security instructor
6.5.1.3 packet tracer   layer 2 vlan security instructor6.5.1.3 packet tracer   layer 2 vlan security instructor
6.5.1.3 packet tracer layer 2 vlan security instructor
 
Airheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.xAirheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.x
 
HSRP ccna
HSRP ccna HSRP ccna
HSRP ccna
 
Linux wireless kickstarter Guide
Linux wireless kickstarter GuideLinux wireless kickstarter Guide
Linux wireless kickstarter Guide
 
VTP
VTPVTP
VTP
 
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard AgentsAirheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
 
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 final
 
CCNA3 Verson6 Chapter4
CCNA3 Verson6 Chapter4CCNA3 Verson6 Chapter4
CCNA3 Verson6 Chapter4
 
EMEA Airheads - What does AirMatch do differently?v2
 EMEA Airheads - What does AirMatch do differently?v2 EMEA Airheads - What does AirMatch do differently?v2
EMEA Airheads - What does AirMatch do differently?v2
 
Aruba instant 6.4.0.2 4.1 user guide
Aruba instant 6.4.0.2 4.1 user guideAruba instant 6.4.0.2 4.1 user guide
Aruba instant 6.4.0.2 4.1 user guide
 
Basic ASA Configuration, NAT in ASA Firewall
Basic ASA Configuration,NAT in ASA FirewallBasic ASA Configuration,NAT in ASA Firewall
Basic ASA Configuration, NAT in ASA Firewall
 
IOS Cisco - Cheat sheets
IOS Cisco - Cheat sheetsIOS Cisco - Cheat sheets
IOS Cisco - Cheat sheets
 
Ccna Commands In 10 Minutes
Ccna Commands In 10 MinutesCcna Commands In 10 Minutes
Ccna Commands In 10 Minutes
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
Policy Based Routing (PBR)
Policy Based Routing (PBR)Policy Based Routing (PBR)
Policy Based Routing (PBR)
 
CCNP Switching Chapter 5
CCNP Switching Chapter 5CCNP Switching Chapter 5
CCNP Switching Chapter 5
 
EMEA Airheads - Configuring different APIs in Aruba 8.x
EMEA Airheads - Configuring different APIs  in Aruba 8.x EMEA Airheads - Configuring different APIs  in Aruba 8.x
EMEA Airheads - Configuring different APIs in Aruba 8.x
 
EMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP DeploymentEMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP Deployment
 

En vedette

CCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN RoutingCCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN RoutingAmir Jafari
 
Cisco CCNA v5 Lab
Cisco CCNA v5 LabCisco CCNA v5 Lab
Cisco CCNA v5 Labant09_sain
 
Vlans
VlansVlans
Vlans1 2d
 
Smart powetr grids
Smart powetr gridsSmart powetr grids
Smart powetr gridsAmir Jafari
 
Designing Clocked Synchronous State Machine
Designing Clocked Synchronous State MachineDesigning Clocked Synchronous State Machine
Designing Clocked Synchronous State MachineAbhilash Nair
 
Ccna 4 final lab switchi
Ccna 4 final lab switchiCcna 4 final lab switchi
Ccna 4 final lab switchiLeandro Uglar
 
CCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network AssociateCCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network AssociateAmir Jafari
 
CCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking ModelsCCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking ModelsAmir Jafari
 
234821765 ccna-virtual-lab
234821765 ccna-virtual-lab234821765 ccna-virtual-lab
234821765 ccna-virtual-labITALTEL S.A.C
 
Convolutional Codes And Their Decoding
Convolutional Codes And Their DecodingConvolutional Codes And Their Decoding
Convolutional Codes And Their DecodingKakali Saharia
 
Sequential circuits in digital logic design
Sequential circuits in digital logic designSequential circuits in digital logic design
Sequential circuits in digital logic designNallapati Anindra
 
Sequential Logic Circuit
Sequential Logic CircuitSequential Logic Circuit
Sequential Logic CircuitRamasubbu .P
 
50400699 cisco-certified-network-administrator
50400699 cisco-certified-network-administrator50400699 cisco-certified-network-administrator
50400699 cisco-certified-network-administratorNaresh Gotad
 
Synchronous state machines. Moore and Mealy state machines (FSM)
Synchronous state machines.  Moore and Mealy state machines (FSM)Synchronous state machines.  Moore and Mealy state machines (FSM)
Synchronous state machines. Moore and Mealy state machines (FSM)Mumbi Chishimba
 
Finite State Machines
Finite State Machines Finite State Machines
Finite State Machines Basel Mansour
 
synchronous state machine design
synchronous state machine designsynchronous state machine design
synchronous state machine designAdarsh Patel
 
Analysis of state machines
Analysis of state machinesAnalysis of state machines
Analysis of state machinesAbhilash Nair
 

En vedette (20)

CCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN RoutingCCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN Routing
 
Cisco CCNA v5 Lab
Cisco CCNA v5 LabCisco CCNA v5 Lab
Cisco CCNA v5 Lab
 
Vlans
VlansVlans
Vlans
 
Smart powetr grids
Smart powetr gridsSmart powetr grids
Smart powetr grids
 
Designing Clocked Synchronous State Machine
Designing Clocked Synchronous State MachineDesigning Clocked Synchronous State Machine
Designing Clocked Synchronous State Machine
 
CCNA- part 9 vlan
CCNA- part 9 vlanCCNA- part 9 vlan
CCNA- part 9 vlan
 
Ccna 4 final lab switchi
Ccna 4 final lab switchiCcna 4 final lab switchi
Ccna 4 final lab switchi
 
CCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network AssociateCCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network Associate
 
CCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking ModelsCCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking Models
 
234821765 ccna-virtual-lab
234821765 ccna-virtual-lab234821765 ccna-virtual-lab
234821765 ccna-virtual-lab
 
Convolutional Codes And Their Decoding
Convolutional Codes And Their DecodingConvolutional Codes And Their Decoding
Convolutional Codes And Their Decoding
 
Lab can ban ccna
Lab can ban ccnaLab can ban ccna
Lab can ban ccna
 
Sequential circuits in digital logic design
Sequential circuits in digital logic designSequential circuits in digital logic design
Sequential circuits in digital logic design
 
Sequential Logic Circuit
Sequential Logic CircuitSequential Logic Circuit
Sequential Logic Circuit
 
50400699 cisco-certified-network-administrator
50400699 cisco-certified-network-administrator50400699 cisco-certified-network-administrator
50400699 cisco-certified-network-administrator
 
Synchronous state machines. Moore and Mealy state machines (FSM)
Synchronous state machines.  Moore and Mealy state machines (FSM)Synchronous state machines.  Moore and Mealy state machines (FSM)
Synchronous state machines. Moore and Mealy state machines (FSM)
 
Finite State Machines
Finite State Machines Finite State Machines
Finite State Machines
 
synchronous state machine design
synchronous state machine designsynchronous state machine design
synchronous state machine design
 
Analysis of state machines
Analysis of state machinesAnalysis of state machines
Analysis of state machines
 
lab1
lab1lab1
lab1
 

Similaire à CCNA Lab 2-Configuring a Switch Part II

Security Concerns in LANs.pptx
Security Concerns in LANs.pptxSecurity Concerns in LANs.pptx
Security Concerns in LANs.pptxjoko
 
Chapter 13 : Introduction to switched networks
Chapter 13 : Introduction to switched networksChapter 13 : Introduction to switched networks
Chapter 13 : Introduction to switched networksteknetir
 
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxAll contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxgalerussel59292
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationVuz Dở Hơi
 
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksChapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksYaser Rahmati
 
KPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_finalKPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_finalFisal Anwari
 
Praktikum Lab 14 - Switch Security Configuration.docx
Praktikum Lab 14 - Switch Security Configuration.docxPraktikum Lab 14 - Switch Security Configuration.docx
Praktikum Lab 14 - Switch Security Configuration.docxIhsan Ihsan
 
Exercise 4c stp rapid pvst+ question
Exercise 4c   stp rapid pvst+ questionExercise 4c   stp rapid pvst+ question
Exercise 4c stp rapid pvst+ questionsufi1248
 
Cisco systems hacking layer 2 ethernet switches
Cisco systems   hacking layer 2 ethernet switchesCisco systems   hacking layer 2 ethernet switches
Cisco systems hacking layer 2 ethernet switchesKJ Savaliya
 
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Sumutiu Marius
 
Ccna lab manual 640 802
Ccna lab manual 640 802Ccna lab manual 640 802
Ccna lab manual 640 802manikkan
 
Network topology by essay corp uk
Network topology by essay corp ukNetwork topology by essay corp uk
Network topology by essay corp ukJohnsmith5188
 
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdfBRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdfssusercbaa33
 
TitleABC123 Version X1Film ListPSYCH650 Version 2.docx
TitleABC123 Version X1Film ListPSYCH650 Version 2.docxTitleABC123 Version X1Film ListPSYCH650 Version 2.docx
TitleABC123 Version X1Film ListPSYCH650 Version 2.docxjuliennehar
 
Hướng dẫn cài đặt switch planet layer 3
Hướng dẫn cài đặt switch planet layer 3Hướng dẫn cài đặt switch planet layer 3
Hướng dẫn cài đặt switch planet layer 33c telecom
 
Id. 01 router (computing)
Id. 01 router (computing)Id. 01 router (computing)
Id. 01 router (computing)Rawa KirKuKi
 

Similaire à CCNA Lab 2-Configuring a Switch Part II (20)

1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618) 1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618)
 
Security Concerns in LANs.pptx
Security Concerns in LANs.pptxSecurity Concerns in LANs.pptx
Security Concerns in LANs.pptx
 
Chapter 13 : Introduction to switched networks
Chapter 13 : Introduction to switched networksChapter 13 : Introduction to switched networks
Chapter 13 : Introduction to switched networks
 
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxAll contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
 
Cap2 configuring switch
Cap2   configuring switchCap2   configuring switch
Cap2 configuring switch
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
 
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksChapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched Networks
 
KPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_finalKPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_final
 
Praktikum Lab 14 - Switch Security Configuration.docx
Praktikum Lab 14 - Switch Security Configuration.docxPraktikum Lab 14 - Switch Security Configuration.docx
Praktikum Lab 14 - Switch Security Configuration.docx
 
PROYECTO VLANS
PROYECTO VLANSPROYECTO VLANS
PROYECTO VLANS
 
Exercise 4c stp rapid pvst+ question
Exercise 4c   stp rapid pvst+ questionExercise 4c   stp rapid pvst+ question
Exercise 4c stp rapid pvst+ question
 
Day 13.1..1 catalyst switch
Day 13.1..1 catalyst switchDay 13.1..1 catalyst switch
Day 13.1..1 catalyst switch
 
Cisco systems hacking layer 2 ethernet switches
Cisco systems   hacking layer 2 ethernet switchesCisco systems   hacking layer 2 ethernet switches
Cisco systems hacking layer 2 ethernet switches
 
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
 
Ccna lab manual 640 802
Ccna lab manual 640 802Ccna lab manual 640 802
Ccna lab manual 640 802
 
Network topology by essay corp uk
Network topology by essay corp ukNetwork topology by essay corp uk
Network topology by essay corp uk
 
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdfBRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
 
TitleABC123 Version X1Film ListPSYCH650 Version 2.docx
TitleABC123 Version X1Film ListPSYCH650 Version 2.docxTitleABC123 Version X1Film ListPSYCH650 Version 2.docx
TitleABC123 Version X1Film ListPSYCH650 Version 2.docx
 
Hướng dẫn cài đặt switch planet layer 3
Hướng dẫn cài đặt switch planet layer 3Hướng dẫn cài đặt switch planet layer 3
Hướng dẫn cài đặt switch planet layer 3
 
Id. 01 router (computing)
Id. 01 router (computing)Id. 01 router (computing)
Id. 01 router (computing)
 

Plus de Amir Jafari

CCNA R&S-20-Configuring IPv4 Addresses and Routes
CCNA R&S-20-Configuring IPv4 Addresses and RoutesCCNA R&S-20-Configuring IPv4 Addresses and Routes
CCNA R&S-20-Configuring IPv4 Addresses and RoutesAmir Jafari
 
CCNA R&S-19-Operating Cisco Routers
CCNA R&S-19-Operating Cisco RoutersCCNA R&S-19-Operating Cisco Routers
CCNA R&S-19-Operating Cisco RoutersAmir Jafari
 
CCNA R&S-18-Analyzing Existing Subnets
CCNA R&S-18-Analyzing Existing SubnetsCCNA R&S-18-Analyzing Existing Subnets
CCNA R&S-18-Analyzing Existing SubnetsAmir Jafari
 
CCNA R&S-17-Analyzing Subnet Masks
CCNA R&S-17-Analyzing Subnet MasksCCNA R&S-17-Analyzing Subnet Masks
CCNA R&S-17-Analyzing Subnet MasksAmir Jafari
 
CCNA R&S-16-Analyzing Classful IPv4 Networks
CCNA R&S-16-Analyzing Classful IPv4 NetworksCCNA R&S-16-Analyzing Classful IPv4 Networks
CCNA R&S-16-Analyzing Classful IPv4 NetworksAmir Jafari
 
CCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 SubnettingCCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 SubnettingAmir Jafari
 
CCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol ImplementationCCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol ImplementationAmir Jafari
 
CCNA R&S-12-Spanning Tree Protocol Concepts
CCNA R&S-12-Spanning Tree Protocol ConceptsCCNA R&S-12-Spanning Tree Protocol Concepts
CCNA R&S-12-Spanning Tree Protocol ConceptsAmir Jafari
 
CCNA R&S-11-Troubleshooting Ethernet LANs
CCNA R&S-11-Troubleshooting Ethernet LANsCCNA R&S-11-Troubleshooting Ethernet LANs
CCNA R&S-11-Troubleshooting Ethernet LANsAmir Jafari
 
CCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANsCCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANsAmir Jafari
 
CCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet SwitchingCCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet SwitchingAmir Jafari
 
CCNA R&S-06-Fundamentals of TCP-IP Transport and Applications
CCNA R&S-06-Fundamentals of TCP-IP Transport and ApplicationsCCNA R&S-06-Fundamentals of TCP-IP Transport and Applications
CCNA R&S-06-Fundamentals of TCP-IP Transport and ApplicationsAmir Jafari
 
CCCNA R&S-04-Fundamentals of WANs
CCCNA R&S-04-Fundamentals of WANsCCCNA R&S-04-Fundamentals of WANs
CCCNA R&S-04-Fundamentals of WANsAmir Jafari
 
CCCNA R&S-03-Fundamentals of Ethernet LANs
CCCNA R&S-03-Fundamentals of Ethernet LANsCCCNA R&S-03-Fundamentals of Ethernet LANs
CCCNA R&S-03-Fundamentals of Ethernet LANsAmir Jafari
 
CCNA Voice 640-461- Part 4 historic voice-digital connectivity-part 2
CCNA Voice 640-461- Part 4  historic voice-digital connectivity-part 2CCNA Voice 640-461- Part 4  historic voice-digital connectivity-part 2
CCNA Voice 640-461- Part 4 historic voice-digital connectivity-part 2Amir Jafari
 
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networksPerformance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networksAmir Jafari
 
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication NetworksPerformance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication NetworksAmir Jafari
 

Plus de Amir Jafari (18)

CCNA R&S-20-Configuring IPv4 Addresses and Routes
CCNA R&S-20-Configuring IPv4 Addresses and RoutesCCNA R&S-20-Configuring IPv4 Addresses and Routes
CCNA R&S-20-Configuring IPv4 Addresses and Routes
 
CCNA R&S-19-Operating Cisco Routers
CCNA R&S-19-Operating Cisco RoutersCCNA R&S-19-Operating Cisco Routers
CCNA R&S-19-Operating Cisco Routers
 
CCNA R&S-18-Analyzing Existing Subnets
CCNA R&S-18-Analyzing Existing SubnetsCCNA R&S-18-Analyzing Existing Subnets
CCNA R&S-18-Analyzing Existing Subnets
 
CCNA R&S-17-Analyzing Subnet Masks
CCNA R&S-17-Analyzing Subnet MasksCCNA R&S-17-Analyzing Subnet Masks
CCNA R&S-17-Analyzing Subnet Masks
 
CCNA R&S-16-Analyzing Classful IPv4 Networks
CCNA R&S-16-Analyzing Classful IPv4 NetworksCCNA R&S-16-Analyzing Classful IPv4 Networks
CCNA R&S-16-Analyzing Classful IPv4 Networks
 
CCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 SubnettingCCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 Subnetting
 
CCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol ImplementationCCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol Implementation
 
CCNA R&S-12-Spanning Tree Protocol Concepts
CCNA R&S-12-Spanning Tree Protocol ConceptsCCNA R&S-12-Spanning Tree Protocol Concepts
CCNA R&S-12-Spanning Tree Protocol Concepts
 
CCNA R&S-11-Troubleshooting Ethernet LANs
CCNA R&S-11-Troubleshooting Ethernet LANsCCNA R&S-11-Troubleshooting Ethernet LANs
CCNA R&S-11-Troubleshooting Ethernet LANs
 
CCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANsCCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANs
 
CCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet SwitchingCCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet Switching
 
CCNA R&S-06-Fundamentals of TCP-IP Transport and Applications
CCNA R&S-06-Fundamentals of TCP-IP Transport and ApplicationsCCNA R&S-06-Fundamentals of TCP-IP Transport and Applications
CCNA R&S-06-Fundamentals of TCP-IP Transport and Applications
 
CCCNA R&S-04-Fundamentals of WANs
CCCNA R&S-04-Fundamentals of WANsCCCNA R&S-04-Fundamentals of WANs
CCCNA R&S-04-Fundamentals of WANs
 
CCCNA R&S-03-Fundamentals of Ethernet LANs
CCCNA R&S-03-Fundamentals of Ethernet LANsCCCNA R&S-03-Fundamentals of Ethernet LANs
CCCNA R&S-03-Fundamentals of Ethernet LANs
 
Network design
Network designNetwork design
Network design
 
CCNA Voice 640-461- Part 4 historic voice-digital connectivity-part 2
CCNA Voice 640-461- Part 4  historic voice-digital connectivity-part 2CCNA Voice 640-461- Part 4  historic voice-digital connectivity-part 2
CCNA Voice 640-461- Part 4 historic voice-digital connectivity-part 2
 
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networksPerformance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
 
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication NetworksPerformance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
 

Dernier

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Dernier (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

CCNA Lab 2-Configuring a Switch Part II

  • 1. amir-jafari.com ©2015 Amir Jafari – www.amir-Jafari.com. All rights reserved. Page 1 of 10 CCNA Lab 2: Configuring a Switch Part II
  • 2. amir-jafari.com ©2015 Amir Jafari – www.amir-Jafari.com. All rights reserved. Page 2 of 10 Table of Contents Page 1- Objectives...................................................................................................................................................3 2- Scenario .....................................................................................................................................................3 3- Equipment List............................................................................................................................................3 4- Topology Diagram ......................................................................................................................................4 5-Addressing Table.........................................................................................................................................4 6-Detailed Lab Steps ......................................................................................................................................5 6-1 Part 1: Prepare the Network (Cable, Erase, and Reload the Switch)...................................................5 6-1-1- Designing and Configuration ........................................................................................................5 6-1-2- Verification ....................................................................................................................................5 6-1-3 Troubleshooting .............................................................................................................................5 6-2: Part 2: Perform Basic Device Configurations ......................................................................................5 6-2-1- Designing and Configuration ........................................................................................................5 6-2-2- Verification ....................................................................................................................................6 6-3: Part 3: Configuring Port Security .........................................................................................................6 6-3-1- Designing and Configuration ........................................................................................................6 Then connect PC2 to switch port Fast Ethernet 0/20..............................................................................7 Disconnect PC1, PC2 and connect PC1 to port Fast Ethernet 0/20. Wait for the amber link light to turn green. Once it turns green, it should almost immediately turn off...........................................................7 Note: Some IOS version may require a manual shutdown command before entering the no shutdown command.................................................................................................................................................7 6-3-2- Verification ....................................................................................................................................8 6-4: Part 4: Configure Switch to Accept Incoming SSH Connections.........................................................8 6-3-1- Designing and Configuration ........................................................................................................8 6-3-2- Verification ....................................................................................................................................9
  • 3. amir-jafari.com ©2015 Amir Jafari – www.amir-Jafari.com. All rights reserved. Page 3 of 10 1- Objectives  Configure basic switch port security  Manage the MAC address table  Configuring SSH to remotely connect to other devices 2- Scenario This lab introduces you the basic switch port security configuration and configuring the Switch to accept incoming SSH connections. 3- Equipment List  Cisco Catalyst 2960 Switch with Cisco IOS Release 12.2. The Cisco implementation of SSH requires Cisco IOS Software to support RSA authentication and minimum DES encryption—a cryptographic software image.  Two PCs that will run Windows XP or later
  • 4. amir-jafari.com ©2015 Amir Jafari – www.amir-Jafari.com. All rights reserved. Page 4 of 10 4- Topology Diagram 5-Addressing Table Device Interface IP Address Subnet Mask Defualt Gateway PC1 NIC 172.17.99.21 255.255.255.0 172.17.99.1 PC2 NIC 172.17.99.32 255.255.255.0 172.17.99.1 S1 VLAN 1 172.17.99.11 255.255.255.0 172.17.99.1
  • 5. amir-jafari.com ©2015 Amir Jafari – www.amir-Jafari.com. All rights reserved. Page 5 of 10 6-Detailed Lab Steps 6-1 Part 1: Prepare the Network (Cable, Erase, and Reload the Switch) 6-1-1- Designing and Configuration Step 1: Cable a network Cable a network that is similar to the one in the topology diagram. Create a console connection to the switch. Step 2: Clear the configuration on the switch Clear the configuration on the switch based on the “CCNA Lab 1-Configuring a Switch Part I”, Detailed Lab Steps, Part 1. 6-1-2- Verification Do the verification based on the “CCNA Lab 1-Configuring a Switch Part I”, Detailed Lab Steps, Part 1. 6-1-3 Troubleshooting Do the troubleshooting based on the “CCNA Lab 1-Configuring a Switch Part I”, Detailed Lab Steps, Part 1. 6-2: Part 2: Perform Basic Device Configurations 6-2-1- Designing and Configuration Perform Basic Device Configurations based on the “CCNA Lab 1-Configuring a Switch Part I”, Detailed Lab Steps, Part 2.
  • 6. amir-jafari.com ©2015 Amir Jafari – www.amir-Jafari.com. All rights reserved. Page 6 of 10 6-2-2- Verification Do the verification based on the “CCNA Lab 1-Configuring a Switch Part I”, Detailed Lab Steps, Detailed Lab Steps, Part 2. 6-3: Part 3: Configuring Port Security 6-3-1- Designing and Configuration Step 1: Configure hosts Set the IP address, subnet mask and default gateway for PC1 and PC2 based on the address table. Do not connect PC2 to the switch yet. Step 2: Configure port security on an access port (Learn the MAC addresses dynamically) Configure switch port Fast Ethernet 0/18 to accept only two devices, to learn the MAC addresses of those devices dynamically, and to block traffic from invalid hosts if a violation occurs. S1(config)#interface fastethernet 0/18 S1(config-if)#switchport mode access S1(config-if)#switchport port-security S1(config-if)#switchport port-security maximum 2 S1(config-if)#switchport port-security mac-address sticky S1(config-if)#switchport port-security violation restrict S1(config-if)#exit Step 3: Configure port security on an access port (Set a specific secure MAC address) Configure switch port Fast Ethernet 0/20 to accept only one device, to Sets a specific secure MAC address, and to block traffic from invalid hosts if a violation occurs. Default Port Security Configuration is as follow:
  • 7. amir-jafari.com ©2015 Amir Jafari – www.amir-Jafari.com. All rights reserved. Page 7 of 10 Feature Deafault Setting Port Security Disable Maximum number of secure MAC address 1 Violation mode Shutdown So when you do not set the violation and maximum MAC address, the default setting will be considered. S1(config)#interface fastethernet 0/20 S1(config-if)#switchport mode access S1(config-if)#switchport port-security S1(config-if)#switchport port-security mac-address mac-address (PC2 MAC address) S1(config-if)#exit Then connect PC2 to switch port Fast Ethernet 0/20. Step 4: Introduce a rogue host Disconnect PC1, PC2 and connect PC1 to port Fast Ethernet 0/20. Wait for the amber link light to turn green. Once it turns green, it should almost immediately turn off. Step 5: Reactivate the port If a security violation occurs and the port is shut down, you can use the no shutdown command to reactivate it. However, as long as the rogue host is attached to Fast Ethernet 0/20, any traffic from the host disables the port. Reconnect PC2 to Fast Ethernet 0/20, and enter the following commands on the switch: S1# configure terminal S1(config)#interface fastethernet 0/20 S1(config-if)# no shutdown S1(config-if)#exit Note: Some IOS version may require a manual shutdown command before entering the no shutdown command.
  • 8. amir-jafari.com ©2015 Amir Jafari – www.amir-Jafari.com. All rights reserved. Page 8 of 10 6-3-2- Verification Step 1: Verify the results Show the port security settings. S1#show port-security Step 2: Examine the running configuration file With sticky secure MAC addresses feature, port security learns the MAC addresses off each port and stores those in the port security configuration (in the running-config file). Port security does not save the configuration of the sticky addresses, so use the copy running-config startup-config command if desired. S1#show running-config Step 3: Determine the MAC addresses that the switch has learned Any MAC addresses associated with a port on which port security is enabled show up as static MAC addresses. S1#show mac-address-table 6-4: Part 4: Configure Switch to Accept Incoming SSH Connections 6-3-1- Designing and Configuration Step 1: Creates a locally significant username/ password combination To work, SSH requires a local username database. S1(config)#username cisco password class Step 2: Configure the vty lines to use usernames Tell Switch to require SSH connections to use a locally configured username/password pair.
  • 9. amir-jafari.com ©2015 Amir Jafari – www.amir-Jafari.com. All rights reserved. Page 9 of 10 S1(config)#line vty 0 15 S1(config-line)#login local S1(config-line)#exit Step 3: Creates a host domain for the Switch To work, SSH requires a local IP domain. S1(config)#ip domain-name cisco.com Step 4: Create the encryption keys Enables the SSH server for local and remote authentication on the switch and generates an RSA key pair. S1(config)#crypto key generate rsa How many bits in the modulus [512]: 1024 Step 5: Enable SSH Version 2 S1(config)#ip ssh version 2 Step 6: Disable support for inbound Telnet connections The switch supports both Telnet and SSH on the vty lines, but you can disable Telnet for tighter security. S1(config)#line vty 0 15 S1(config-line)#transport input ssh 6-3-2- Verification Step 1: Examine the running configuration file S1#show running-config Step 2: The status information about the SSH server The show ip ssh command lists status information about the SSH server itself. S1#show ip ssh
  • 10. amir-jafari.com ©2015 Amir Jafari – www.amir-Jafari.com. All rights reserved. Page 10 of 10 Step 3: Information about each SSH client The show ssh command then lists information about each SSH client currently connected into the switch. S1#show ssh Step 4: Displays who is connected remotely to Switch This command lists all users logged in to the Swtich, including users at the console, and those connecting using both Telnet and SSH. S1#show users Step 5: Disconnects the remote user connected to Swtich on line x The line number is listed in the output gained from the show users command. S1#clear line x