Escolar Documentos
Profissional Documentos
Cultura Documentos
Introduction
In this practice skills assessment, you will configure the Company A network with RPVST+, port
security, EtherChannel, DHCP, VLANs and trunking, and routing between VLANs. In addition you will
perform an initial configuration on a switch, secure unused switch ports and secure SVIs. A simple
access control list will also be configured.
All IOS device configurations should be completed from a direct terminal connection to the
device console from an available host.
Some values that are required to complete the configurations have not been given to you. In
those cases, create the values that you need to complete the requirements. These values may
include certain IP addresses, passwords, interface descriptions, banner text, and other
values.
For the sake of time, many repetitive but important configuration tasks have been omitted from this
activity. Many of these tasks, especially those related to device security, are essential elements of a
network configuration. The intent of this activity is not to diminish the importance of full device
configurations.
Addressing Table:
Instructions
All configurations must be performed through a direct terminal connection to the device
consoles from an available host.
Step 1: Configure initial device settings on SW-B only.
Configure the host name as SW-B. The host name must match the value in the table exactly
in spelling, case, and punctuation.
Prevent the router CLI from attempting to look up mistyped commands as URLs.
Configure an appropriate message-of-the-day banner.
Configure an encrypted password for Privileged EXEC mode.
Protect access to the device console.
Prevent IOS status messages from interrupting command line output at the device console.
Encrypt all clear text passwords.
Step 2: Create and name VLANs.
On all three switches, create and name the VLANs shown in the VLAN Table.
The VLAN names must match the values in the table exactly in spelling, case, and
punctuation.
Each switch should be configured with all of the VLANs shown in the table.
Step 3: Assign switch ports to VLANs.
Using the VLAN table, assign the switch ports to the VLANs you created in Step 2, as follows:
All switch ports that you assign to VLANs should be configured to static access mode.
All switch ports that you assign to VLANs should be activated.
Note that all the unused ports on SW-B only should be assigned to VLAN 999. This
configuration step on switches SW-A and SW-C has been left out of this activity for the sake of
time.
Step 4: Configure the SVIs.
Using the addressing table, create and address the SVIs on all three switches. Configure the
switches so that they can connect with remote hosts. Full connectivity will be established after
routing between VLANs has been configured later in this assessment.
Use LACP.
The switch ports on both sides of Channels 1 and 2 should both initiate negotiations for
channel establishment.
The switch ports on the SW-B side of the Channel 3 should initiate negotiations with the
switch ports on SW-C.
The switch ports on the SW-C side of Channel 3 should not initiate negotiations with the
switch ports on the other side of the channel.
b. Configure all port-channel interfaces as trunks.
Create a DHCP pool for hosts on VLAN5 using the pool name vlan5pool.
Create a DHCP pool for hosts on VLAN10 using the pool name vlan10pool.
Create a DHCP pool for hosts on VLAN15 using the pool name vlan15pool.
All VLAN pool names must match the provided values exactly.
Exclude the first five addresses from each pool.
Configure a DNS server address of 192.0.2.62.
Once they have received addresses, the hosts should be able to ping hosts on other
networks.
Step 11: Configure host addressing.
All hosts should be able to ping each other and the two external servers after they have been
addressed.
Hosts on VLANs 5, 10 and 15 should be configured to receive addresses dynamically over DHCP.
Hosts on VLAN 100 should be addressed statically as indicated in the addressing table. Once
configured, the hosts should be able to ping hosts on other networks.
Shared by Gega Sxirtladze
Router Campus
en
conf t
int g0/1
no shut
no shutdown
exit
int g0/1.5
encapsulation dot1Q 5
ip address 10.10.5.1 255.255.255.0
no shutdown
exit
int g0/1.10
encapsulation dot1Q 10
ip address 10.10.10.1 255.255.255.0
no shut
exit
int g0/1.15
encapsulation dot1Q 15
ip addr 10.10.15.1 255.255.255.0
no shut
exit
int g0/1.100
encapsulation dot1Q 100
ip addr 10.10.100.1 255.255.255.0
no shut
exit
int g0/1.199
encapsulation dot1Q 199
ip addr 10.10.199.1 255.255.255.0
no shut
exit
ip dhcp excluded-address 10.10.5.1 10.10.5.5
ip dhcp pool vlan5pool
network 10.10.5.0 255.255.255.0
default-router 10.10.5.1
dns-server 192.0.2.62
exit
SW-B
en
conf t
hostname SW-B
no ip domain-lookup
banner motd SW-B
enable secret cisco
service password-encryption
line console 0
password cisco
login
Logging synchronous
exit
line vty 0 15
password cisco
login
exit
no logging console
vlan 5
name sales
exit
vlan 10
name prod
exit
vlan 15
name acct
exit
vlan 100
name admin
exit
vlan 199
name manage
exit
vlan 999
name null
exit
int f0/7
switchport mode access
switchport access vlan 5
no shutdown
exit
int f0/10
switchport mode access
switchport access vlan 10
no shutdown
exit
int f0/15
switchport mode access
switchport access vlan 15
no shutdown
exit
int f0/24
switchport mode access
switchport access vlan 100
no shutdown
exit
int port-channel 3
exit
int range fa0/5-6
channel-group 3 mode active
exit
int fa0/10
switchport port-security
switchport port-security maximum 2
switchport port-security mac-address sticky
switchport port-security violation restrict
exit
int fa0/15
switchport port-security
switchport port-security maximum 2
switchport port-security mac-address sticky
switchport port-security violation restrict
exit
int fa0/24
switchport port-security
switchport port-security maximum 2
switchport port-security mac-address sticky
switchport port-security violation restrict
exit
ip domain-name ccnaPTSA.com
crypto key generate rsa
1024
ip ssh version 2
line vty 0 4
login local
transport input ssh
exit
-
SW-A>
en
conf t
vlan 5
name sales
exit
vlan 10
name prod
exit
vlan 15
name acct
exit
vlan 100
name admin
exit
vlan 199
name manage
exit
vlan 999
name null
exit
int f0/5
switchport mode access
switchport access vlan 5
no shutdown
exit
int f0/10
switchport mode access
switchport access vlan 10
no shutdown
exit
int f0/15
switchport mode access
switchport access vlan 15
no shutdown
exit
int f0/24
switchport mode access
switchport access vlan 100
no shutdown
exit
int gig1/1
no shutdown
switchport mode trunk
exit
SW-C
en
conf t
vlan 5
name sales
exit
vlan 10
name prod
exit
vlan 15
name acct
exit
vlan 100
name admin
exit
vlan 199
name manage
exit
vlan 999
name null
exit
int f0/7
switchport mode access
switchport access vlan 5
no shutdown
exit
int f0/10
switchport mode access
switchport access vlan 10
no shutdown
exit
int f0/15
switchport mode access
switchport access vlan 15
no shutdown
exit
int f0/24
switchport mode access
switchport access vlan 100
no shutdown
exit
int fa0/7
spanning-tree portfast
spanning-tree bpduguard enable
exit
int fa0/10
spanning-tree portfast
spanning-tree bpduguard enable
exit
int fa0/15
spanning-tree portfast
spanning-tree bpduguard enable
exit
int fa0/24
spanning-tree portfast
spanning-tree bpduguard enable
exit