Assinment 1 Week 4
Assinment 1 Week 4
Body………………………………………………………………………….3
Verify end-to-end-connectivity…………………………………………………….
Questions to answer……………………………………………………….……..25
Conclusion………………………………………………………………………....38
Introduction.
This report outlines the comprehensive configuration and security of network devices as part of a
hands-on lab designed for the review of Layer 2 security features. The lab's primary objectives
include the configuration of network devices, VLAN setup, and the implementation of robust
switch security measures.
In the first part of the lab, I will establish the physical and basic operational setup of a network
involving a Cisco 4221 router and two Cisco Catalyst 2960 switches. This foundational
configuration will ensure that the devices are correctly cabled, initialized, and operating with the
necessary basic settings.
The second part focuses on VLAN configuration, where I will create and manage multiple
VLANs, including VLAN 10, and establish Switch Virtual Interfaces (SVIs) to facilitate inter-
VLAN communication. This section emphasizes the importance of proper VLAN management
in maintaining network segmentation and performance.
Finally, the lab delves into advanced switch security configurations. I will implement 802.1Q
trunking, secure unused switchports, and apply DHCP snooping and port security features to
protect the network from potential threats. By verifying end-to-end connectivity throughout these
configurations, the lab not only reinforces theoretical knowledge but also provides practical
experience in network security and management.
This structured approach equipped me with essential skills in configuring and securing network
environments, preparing them for real-world networking challenges.
Topology
Addressing Table
Objectives
Part 1: Configure the Network Devices.
• Configure R1.
• Verify end-to-end-connectivity.
Required Resources
• 1 Router (Cisco 4221 with Cisco IOS XE Release 16.9.3 universal image or comparable)
• 2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
• Console cables to configure the Cisco IOS devices via the console ports
enable
configure terminal
hostname R1
no ip domain lookup
default-router 192.168.10.1
domain-name secure.com
interface Loopback0
!
interface GigabitEthernet0/0/1
no shutdown
line con 0
logging synchronous
exec-timeout 0 0
Switch# config t
Switch(config)# hostname S1
Switch# config t
Switch(config)# hostname S2
2. Prevent unwanted DNS lookups on both switches.
S1(config)# no ip domain-lookup
S2(config)# no ip domain-lookup
3. Configure interface descriptions for the ports that are in use in S1 and S2.
S1(config)# vlan 10
S2(config)# vlan 10
2. Configure the IP address according to the Addressing Table for SVI for VLAN 10 on S1 and S2. Enable
S2(config-if)# no shutdown
Step 3: Configure VLAN 333 with the name Native on S1 and S2.
Step 4: Configure VLAN 999 with the name ParkingLot on S1 and S2.
1. On both switches, configure trunking on F0/1 to use VLAN 333 as the native VLAN.
Fa0/1 1-4094
Fa0/1 1,10,333,999
Fa0/1 1-4094
Fa0/1 1,10,333,999
Fa0/1 1,10,333,999
1. On S1, configure F0/5 and F0/6 as access ports that are associated with VLAN 10.
2. On S2, configure F0/18 as an access port that is associated with VLAN 10.
1. On S1 and S2, move the unused ports from VLAN 1 to VLAN 999 and disable the unused ports.
S1(config-if-range)# shutdown
S2(config-if-range)# shutdown
2. Verify that unused ports are disabled and associated with VLAN 999 by issuing the show command.
<output omitted>
<output omitted>
The interfaces F0/6 on S1 and F0/18 on S2 are configured as access ports. In this step, you will also
1. On S1, issue the show port-security interface f0/6 command to display the default port security
settings for interface F0/6. Record your answers in the table below.
addresses 1
—————————————————————————
(mins)
—————————————————————————–
Max Addresses limit in System (excluding one mac per port) : 8192
4. Enable port security for F0/18 on S2. Configure the port to add MAC addresses learned on the port
(mins)
—- ———– —- —– ————-
—————————————————————————–
Max Addresses limit in System (excluding one mac per port) : 8192
1. On S2, enable DHCP snooping and configure DHCP snooping on VLAN 10.
3. Limit the untrusted port, F18 on S2, to five DHCP packets per second.
S2(config)# interface f0/18
10
10
Custom circuit-ids:
FastEthernet0/18 no no 5
Custom circuit-ids:
5. From the command prompt on PC-B, release and then renew the IP address.
6. Verify the DHCP snooping binding using the show ip dhcp snooping binding command.
1. Configure PortFast on all the access ports that are in use on both switches.
2. Enable BPDU guard on S1 and S2 VLAN 10 access ports connected to PC-A and PC-B.
3. Verify that BPDU guard and PortFast are enabled on the appropriate ports.
Port path cost 19, Port priority 128, Port Identifier 128.6.
Verify PING connectivity between all devices in the IP Addressing Table. If the pings fail, you may need
1. In reference to Port Security on S2, why is there no timer value for the remaining age in minutes
This switch does not support the port security aging of sticky secure addresses.
2. In reference to Port Security on S2, if you load the running-config script on S2, why will PC-B on port
Port security is set for only two MAC addresses and port 18 has two “sticky” MAC address
bound to the port. Additionally, the violation is protect, which will never send a console/syslog
3. In reference to Port Security, what is the difference between the absolute aging type and inactivity
aging type?
If the inactivity type is set, then the secure addresses on the port will be removed only if there
is no data traffic from the secure source addresses for the specified time period.
If the absolute type is set, then all secure addresses on this port age out exactly after the
Switch S1
S1# show running-config
Building configuration…
version 15.0
no service pad
no service password-encryption
hostname S1
no ip domain-lookup
vlan 10
name Management
vlan 333
name Native
vlan 999
name ParkingLot
interface FastEthernet0/1
description Link to S2
switchport nonegotiate
interface FastEthernet0/2
shutdown
interface FastEthernet0/3
shutdown
interface FastEthernet0/4
shutdown
interface FastEthernet0/5
description Link to R1
spanning-tree portfast
interface FastEthernet0/6
switchport port-security
spanning-tree portfast
interface FastEthernet0/7
shutdown
interface FastEthernet0/8
shutdown
interface FastEthernet0/9
shutdown
interface FastEthernet0/10
shutdown
interface FastEthernet0/11
shutdown
interface FastEthernet0/12
shutdown
interface FastEthernet0/13
shutdown
interface FastEthernet0/14
shutdown
interface FastEthernet0/15
shutdown
interface FastEthernet0/16
shutdown
interface FastEthernet0/17
switchport access vlan 999
shutdown
interface FastEthernet0/18
shutdown
interface FastEthernet0/19
shutdown
interface FastEthernet0/20
shutdown
interface FastEthernet0/21
shutdown
interface FastEthernet0/22
shutdown
!
interface FastEthernet0/23
shutdown
interface FastEthernet0/24
shutdown
interface GigabitEthernet0/1
shutdown
interface GigabitEthernet0/2
shutdown
interface Vlan1
no ip address
interface Vlan10
ip default-gateway 192.168.10.1
line con 0
exec-timeout 0 0
logging synchronous
line vty 0 4
login
line vty 5 15
login
End
Switch S2
Building configuration…
version 15.0
no service pad
hostname S2
ip dhcp snooping
no ip domain-lookup
vlan 10
name Students
vlan 333
name Native
vlan 999
name ParkingLot
interface FastEthernet0/1
description Link to S1
switchport nonegotiate
interface FastEthernet0/2
interface FastEthernet0/3
shutdown
interface FastEthernet0/4
shutdown
interface FastEthernet0/5
shutdown
interface FastEthernet0/6
shutdown
interface FastEthernet0/7
shutdown
interface FastEthernet0/8
shutdown
interface FastEthernet0/9
shutdown
interface FastEthernet0/10
shutdown
interface FastEthernet0/11
shutdown
interface FastEthernet0/12
shutdown
interface FastEthernet0/13
shutdown
interface FastEthernet0/14
switchport access vlan 999
shutdown
interface FastEthernet0/15
shutdown
interface FastEthernet0/16
shutdown
interface FastEthernet0/17
shutdown
interface FastEthernet0/18
switchport port-security
spanning-tree portfast
spanning-tree bpduguard enable
interface FastEthernet0/19
shutdown
interface FastEthernet0/20
shutdown
interface FastEthernet0/21
shutdown
interface FastEthernet0/22
shutdown
interface FastEthernet0/23
shutdown
interface FastEthernet0/24
switchport access vlan 999
shutdown
interface GigabitEthernet0/1
shutdown
interface GigabitEthernet0/2
shutdown
interface Vlan1
no ip address
interface Vlan10
ip default-gateway 192.168.10.1
line con 0
exec-timeout 0 0
logging synchronous
line vty 0 4
login
line vty 5 15
login
End
CONCLUSION
This was an elaborate activity and help me gained hands-on experience in establishing a functional
network environment. The configuration of VLANs highlighted the importance of network segmentation,
while the implementation of security measures reinforced best practices in protecting network integrity.
By successfully navigating challenges such as DHCP configuration and switch security protocols, I
enhanced my troubleshooting skills and deepened my understanding of networking concepts. This
practical experience not only solidifies theoretical knowledge but also prepares individuals for real-
world scenarios in network management and security.