Lab - Switch Security Configuration (Answers Version)
Lab - Switch Security Configuration (Answers Version)
Topology
Addressing Table
R1
Loopback 0 10.10.1.1 255.255.255.0
S1 VLAN 10 192.168.10.201 255.255.255.0
S2 VLAN 10 192.168.10.202 255.255.255.0
PC – A NIC DHCP 255.255.255.0
PC – B NIC DHCP 255.255.255.0
Objectives
Part 1: Configure the Network Devices.
Cable the network.
Configure R1.
Configure and verify basic switch settings.
Part 2: Configure VLANs on Switches.
Configure VLAN 10.
Configure the SVI for VLAN 10.
Configure VLAN 333 with the name Native on S1 and S2.
Configure VLAN 999 with the name ParkingLot on S1 and S2.
Part 3: Configure Switch Security.
Implement 802.1Q trunking.
Configure access ports.
Secure and disable unused switchports.
Document and implement port security features.
Implement DHCP snooping security.
Implement PortFast and BPDU guard.
Verify end-to-end-connectivity.
Background / Scenario
This is a comprehensive lab to review previously covered Layer 2 security features.
Note: The routers used with CCNA hands-on labs are Cisco 4221 with Cisco IOS XE Release
16.9.3 (universalk9 image). The switches used in the labs are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can
be used. Depending on the model and Cisco IOS version, the commands available and the
output produced might vary from what is shown in the labs. Refer to the Router Interface
Summary Table at the end of the lab for the correct interface identifiers.
Note: Make sure that the switches have been erased and have no startup configurations. If you
are unsure, contact your Answers.
Answers Note: Refer to the Answers Lab Manual for the procedures to initialize and reload
devices.
Required Resources
1 Router (Cisco 4221 with Cisco IOS XE Release 16.9.3 universal image or comparable)
2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows with a terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet cables as shown in the topology
Instructions
enable
configure terminal
hostname R1
no ip domain lookup
ip dhcp excluded-address 192.168.10.1 192.168.10.9
ip dhcp excluded-address 192.168.10.201 192.168.10.202
!
ip dhcp pool Students
network 192.168.10.0 255.255.255.0
default-router 192.168.10.1
domain-name CCNA2.Lab-11.6.1
!
interface Loopback0
ip address 10.10.1.1 255.255.255.0
!
interface GigabitEthernet0/0/1
description Link to S1 Port 5
ip dhcp relay information trusted
ip address 192.168.10.1 255.255.255.0
no shutdown
!
line con 0
logging synchronous
exec-timeout 0 0
b. Verify the running-configuration on R1 using the following command:
R1# show ip interface brief
Interface IP-Address OK? Method
Status Protocol
GigabitEthernet0/0/0 unassigned YES
unset down down
GigabitEthernet0/0/1 192.168.10.1 YES manual up up
Loopback0 10.10.1.1 YES manual up up
Switch# config t
Switch(config)# hostname S1
Open configuration window
Switch# config t
Switch(config)# hostname S2
b. Prevent unwanted DNS lookups on both switches.
S1(config)# no ip domain-lookup
S2(config)# no ip domain-lookup
c. Configure interface descriptions for the ports that are in use in S1 and S2.
S1(config)# interface f0/1
S1(config-if)# description Link to S2
S1(config–if)# interface f0/5
S1(config-if)# description Link to R1
S1(config–if)# interface f0/6
S1(config-if)# description Link to PC-A
S2(config)# vlan 10
S2(config-vlan)# name Management
Step 3: Configure VLAN 333 with the name Native on S1 and S2.
S1(config)# vlan 333
S1(config-vlan)# name Native
Step 4: Configure VLAN 999 with the name ParkingLot on S1 and S2.
S1(config-vlan)# vlan 999
S1(config-vlan)# name ParkingLot
Reflection Questions
1. In reference to Port Security on S2, why is there no timer value for the remaining age in minutes
when sticky learning was configured?
Type your answers here.
This switch does not support the port security aging of sticky secure addresses.
2. In reference to Port Security on S2, if you load the running-config script on S2, why will PC-B on
port 18 never get an IP address via DHCP?
Port security is set for only two MAC addresses and port 18 has two “sticky” MAC
address bound to the port. Additionally, the violation is protect, which will never send a
console/syslog message or increment the violation counter.
3. In reference to Port Security, what is the difference between the absolute aging type and
inactivity aging type?
If the inactivity type is set, then the secure addresses on the port will be removed only if
there is no data traffic from the secure source addresses for the specified time period.
If the absolute type is set, then all secure addresses on this port age out exactly after the
time specified ends.
End of Document
Switch S1
S1# show running-config
Building configuration…
line con 0
exec-timeout 0 0
logging synchronous
line vty 0 4
login
line vty 5 15
login
!
end
Switch S2
S2# show running-config
Building configuration…