Jcdavidson CSIS 331 5.2.2.9 Lab - Configuring Switch Security Features.docx

  • Liberty University
  • CSIS 331
  • Lab Report
  • jcdavidson
  • 10
  • 100% (2) 2 out of 2 people found this document helpful

This preview shows page 1 - 3 out of 10 pages.

Lab – Configuring Switch Security Features Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 172.16.99.1 255.255.255.0 N/A S1 VLAN 99 172.16.99.11 255.255.255.0 172.16.99.1 PC-A NIC 172.16.99.3 255.255.255.0 172.16.99.1 Objectives Part 1: Set up the Topology and Initialize Devices Part 2: Configure Basic Device Settings and Verify Connectivity Part 3: Configure and Verify SSH Access on S1 Configure SSH access. Modify SSH parameters. Verify the SSH configuration. Part 4: Configure and Verify Security Features on S1 Configure and verify general security features. Configure and verify port security. Background / Scenario It is quite common to lock down access and install strong security features on PCs and servers. It is important that your network infrastructure devices, such as switches and routers, are also configured with security features. In this lab, you will follow some best practices for configuring security features on LAN switches. You will only allow SSH and secure HTTPS sessions. You will also configure and verify port security to lock out any device with a MAC address not recognized by the switch. Note : The router used with CCNA hands-on labs is a Cisco 1941 Integrated Services Router (ISR) with Cisco IOS Release 15.2(4)M3 (universalk9 image). The switch used is a Cisco Catalyst 2960 with Cisco IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands available and output produced might vary from what is shown in this lab. Refer to the Router Interface Summary Table at the end of this lab for the correct interface identifiers. Note : Make sure that the router and switch have been erased and have no startup configurations. If you are unsure, contact your instructor or refer to the previous lab for the procedures to initialize and reload devices. © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 10
Lab – Configuring Switch Security Features Required Resources 1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable) 1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable) 1 PC (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term) 1 Console cable to configure the Cisco IOS devices via the console ports 2 Ethernet cables as shown in the topology Part 1: Set Up the Topology and Initialize Devices In Part 1, you will set up the network topology and clear any configurations if necessary. Step 1: Cable the network as shown in the topology. Step 2: Initialize and reload the router and switch. If configuration files were previously saved on the router or switch, initialize and reload these devices back to their default configurations. Part 2: Configure Basic Device Settings and Verify Connectivity In Part 2, you will configure basic settings on the router, switch, and PC. Refer to the Topology and Addressing Table at the beginning of this lab for device names and address information.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture