tamapet.blogg.se

Packet tracer 6.3
Packet tracer 6.3












packet tracer 6.3

Part 2: Configure SSH Access to the Switches

  • Configure the hostname, IP address, and access passwords.
  • Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces. Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Lab – Securing Layer 2 Switches (Instructor Version)
  • Step 5: Verify DHCP snooping configuration.
  • DHCP responses are only permitted through trusted ports.
  • Step 4: Identify the trusted interface(s).
  • Step 3: Limit the number of DHCP requests on an interface.
  • Step 2: Enable DHCP snooping for VLAN 1 and 20.
  • Step 3: Configure PC-A and PC-B to obtain an IP Address using DHCP.
  • Task 2: Configure Inter-VLAN Communication.
  • Step 9: Configure a port with the PVLAN Edge feature.
  • Step 8: Move active ports to a VLAN other than the default VLAN 1.
  • Step 7: Disable unused ports on S1 and S2.
  • Step 6: (Optional) Configure port security for VoIP.
  • Step 5: Remove basic port security on S1 F0/5.
  • Step 4: Clear the S1 Fa0/5 error disabled status.
  • Step 3: Verify port security on S1 Fa0/5.
  • Step 1: Record the R1 Fa0/0 MAC address.
  • Task 4: Configure Port Security and Disable Unused Ports.
  • Step 2: Enable BPDU guard on the S1 and S2 access ports.
  • Step 1: Enable PortFast on S1 and S2 access ports.
  • Step 2: Disable trunking on S2 access ports.
  • Step 1: Disable trunking on S1 access ports.
  • Step 6: Verify the configuration with the show run command.
  • Step 5: Verify the trunking configuration on port F0/1.
  • Step 4: Prevent the use of DTP on S1 and S2.
  • Step 3: Change the native VLAN for the trunk ports on S1 and S2.
  • Step 2: Configure trunk ports on S1 and S2.
  • Step 1: Configure S1 as the root switch.
  • Part 3: Configure Secure Trunks and Access Ports.
  • Step 2: Verify SSH connectivity to S1 from PC-A.
  • packet tracer 6.3

  • Step 1: (Optional) Download and install an SSH client on PC-A and PC-B.
  • Step 8: Save the running configuration to the startup configuration.
  • Step 7: Configure the incoming vty lines.
  • Step 6: Configure SSH timeouts and authentication parameters.
  • Step 3: Generate the RSA encryption key pair for the router.
  • Step 2: Configure a privileged user for login from the SSH client.
  • packet tracer 6.3 packet tracer 6.3

  • Task 1: Configure the SSH Server on S1 and S2 Using the CLI.
  • Part 2: Configure SSH Access to the Switches.
  • Step 5: Save the basic configurations for the router and both switches.
  • Step 4: Verify basic network connectivity.
  • Step 2: Configure basic settings for the router and each switch.
  • Step 1: Cable the network as shown in the topology.
  • Part 1: Configure Basic Switch Settings.
  • Lab – Securing Layer 2 Switches (Instructor Version).













  • Packet tracer 6.3