Configure the hostname, IP address, and access passwords.
Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces. Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Lab – Securing Layer 2 Switches (Instructor Version)
Step 5: Verify DHCP snooping configuration.
DHCP responses are only permitted through trusted ports.
Step 4: Identify the trusted interface(s).
Step 3: Limit the number of DHCP requests on an interface.
Step 2: Enable DHCP snooping for VLAN 1 and 20.
Step 3: Configure PC-A and PC-B to obtain an IP Address using DHCP.
Task 2: Configure Inter-VLAN Communication.
Step 9: Configure a port with the PVLAN Edge feature.
Step 8: Move active ports to a VLAN other than the default VLAN 1.
Step 7: Disable unused ports on S1 and S2.
Step 6: (Optional) Configure port security for VoIP.
Step 5: Remove basic port security on S1 F0/5.
Step 4: Clear the S1 Fa0/5 error disabled status.
Step 3: Verify port security on S1 Fa0/5.
Step 1: Record the R1 Fa0/0 MAC address.
Task 4: Configure Port Security and Disable Unused Ports.
Step 2: Enable BPDU guard on the S1 and S2 access ports.
Step 1: Enable PortFast on S1 and S2 access ports.
Step 2: Disable trunking on S2 access ports.
Step 1: Disable trunking on S1 access ports.
Step 6: Verify the configuration with the show run command.
Step 5: Verify the trunking configuration on port F0/1.
Step 4: Prevent the use of DTP on S1 and S2.
Step 3: Change the native VLAN for the trunk ports on S1 and S2.
Step 2: Configure trunk ports on S1 and S2.
Step 1: Configure S1 as the root switch.
Part 3: Configure Secure Trunks and Access Ports.
Step 2: Verify SSH connectivity to S1 from PC-A.
Step 1: (Optional) Download and install an SSH client on PC-A and PC-B.
Step 8: Save the running configuration to the startup configuration.
Step 7: Configure the incoming vty lines.
Step 6: Configure SSH timeouts and authentication parameters.
Step 3: Generate the RSA encryption key pair for the router.
Step 2: Configure a privileged user for login from the SSH client.
Task 1: Configure the SSH Server on S1 and S2 Using the CLI.
Part 2: Configure SSH Access to the Switches.
Step 5: Save the basic configurations for the router and both switches.
Step 4: Verify basic network connectivity.
Step 2: Configure basic settings for the router and each switch.
Step 1: Cable the network as shown in the topology.