0% found this document useful (0 votes)
52 views

Laboratory Exercise No 5

This document outlines steps for a packet tracer simulation to implement and test switching protocols including DTP, VLANs, VTP, STP, and inter-VLAN routing. Students will configure trunking, security, VLANs, routing and verify connectivity within and between VLANs on multiple switches and a router.

Uploaded by

John Rhey Ibe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views

Laboratory Exercise No 5

This document outlines steps for a packet tracer simulation to implement and test switching protocols including DTP, VLANs, VTP, STP, and inter-VLAN routing. Students will configure trunking, security, VLANs, routing and verify connectivity within and between VLANs on multiple switches and a router.

Uploaded by

John Rhey Ibe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Laboratory Exercise No.

Packet Tracer Simulation of Different Switching Protocols

I. Objectives
1. To implement dynamic trunking protocol (DTP) which establishes trunk and access links.
2. To implement switchport security for every access port interface.
3. To implement VLAN and VLAN trunking protocols for local area network segmentation.
4. To ensure connectivity of every device from different VLANs by implementing inter-VLAN
routing.
5. To verify spanning-tree status for every switch.

II. THEORY
Switches are devices used to interconnect different devices within the local area network
and uses MAC addressing scheme to forward traffic going to connected devices. Aside from
this, switches have the capability to run L2 protocols to ensure uninterrupted connectivity,
proper network segmentation and basic security for local area networks.
In this simulation activity, students will need to implement and verify different switching
protocols such as dynamic trunking protocol (DTP), basic switchport security, virtual local area
network (VLAN), VLAN trunking protocol (VTP), inter-VLAN routing and spanning-tree protocol
(STP).
III. MATERIALS & EQUIPMENT
• Laptop/Computer with installed Cisco Packet Tracer

IV. PROCEDURES

1. Replicate the network diagram shown above. You can either use the topology that was saved
from the synchronous discussion, or you may opt to start from scratch.
2. Make sure every switch and router have basic housekeeping commands configuration.
3. Implement dynamic trunking protocol to assign the trunk and access ports.
4. Implement switchport security with the following conditions:
a. 1 maximum MAC address per access port.
b. 1 static MAC address per access port.
c. If either one of the policies is violated, the port interface will automatically shutdown.

5. Verify spanning-tree protocol and examine the following outputs:


a. What is the bridge ID priority for S1, S2 and S3?
b. Which switch is the root bridge?
c. On S1, which spanning tree ports are in the blocking state on the root switch?
d. On S3, which spanning tree port is in the blocking state?
e. Since the bridge priorities are all the same, what else does the switch use to determine
the root?

6. Now let us observe what happens when we intentionally simulate a broken link. Intentionally
shutdown a designated or root port in a switch.

Hint: Identify first the root bridge, root ports, designated ports and blocking port in reference
with item 11. Then choose one port from the designated ports of the root bridge and shut it
down.
Switch(config)# interface <interface>
Switch(config-if)# shutdown

7. Examine what has changed in the spanning tree topology by verifying the STP status on
every switch.
a. Are there any changes in the port roles of every switches?
b. What has changed about the way that switches forward the traffic?

8. Configure spanning port-fast on all the access ports of the switches.


Switch(config-if)# spanning-tree portfast
9. Assign the access devices and the servers with an IP address from their subnet. Servers must
also belong to their respective VLAN subnets.

VLAN NETWORK
10.10.10.0/24
Admin
10.10.20.0/24
Sales
10.10.30.0/24
Engineering
10.10.40.0/24
IT
Hint: VLAN networks are different from the IP addresses assigned for the VLAN 1
(management VLAN) of every switches.

10. Verify if the devices from the same VLANs of switches 1, 2, and 3 can reach each other. Does
the ping successful? Why? Why not?
11. Verify if the devices from different VLANs of switches 1, 2, and 3 can reach each other. Does
the ping successful? Why? Why not?
12. Verify also if the devices from the same or different VLANs switches 1, 2, and 3 can reach the
devices connected on the BranchX switch. Does the ping successful? Why? Why not?
13. Configure the sub-interfaces on the router interface facing switches 1, 2, and 3 to implement
inter-VLAN routing. Provide the proper default gateway from the subnets given.
14. Repeat step 9.
15. Configure now the sub-interfaces on the router interface facing the BranchX switch and repeat
step 10.
V. QUESTION/S
1. Explain your answers for the questions from procedure number 5.
2. Explain your answers for the questions from procedure number 7.
3. Explain your answers for the questions from procedure number 10.
4. Explain your answers for the questions from procedure number 11.
5. Explain your answers for the questions from procedure number 15.
6. From procedure number 8, what did you observed before and after configuring the command?

VI. CONCLUSION
Basically explain what you have learned from the discussion and simulation of this laboratory exercise.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

You might also like