FRANCENE GASCON 11.6.2 Lab Switch Security Configuration
FRANCENE GASCON 11.6.2 Lab Switch Security Configuration
GASCON
Lab - Switch Security Configuration
Topology
Addressing Table
Objectives
Part 1: Configure the Network Devices.
• Cable the network.
• Configure R1.
• Configure and verify basic switch settings.
Part 2: Configure VLANs on Switches.
• Configure VLAN 10.
© 2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of www.netacad.com
18
Lab - Switch Security Configuration
Background / Scenario
This is a comprehensive lab to review previously covered Layer 2 security features.
Note: The routers used with CCNA hands-on labs are Cisco 4221 with Cisco IOS XE Release 16.9.3
(universalk9 image). The switches used in the labs are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2)
(lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used. Depending on the model
and Cisco IOS version, the commands available and the output produced might vary from what is shown in
the labs. Refer to the Router Interface Summary Table at the end of the lab for the correct interface identifiers.
Note: Make sure that the switches have been erased and have no startup configurations. If you are unsure,
contact your instructor.
Required Resources
• 1 Router (Cisco 4221 with Cisco IOS XE Release 16.9.3 universal image or comparable)
• 2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
• 2 PCs (Windows with a terminal emulation program, such as Tera Term)
• Console cables to configure the Cisco IOS devices via the console ports
• Ethernet cables as shown in the topology
© 2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of www.netacad.com
18
Lab - Switch Security Configuration
Instructions
enable
configure terminal
hostname R1
no ip domain lookup
ip dhcp excluded-address 192.168.10.1 192.168.10.9
ip dhcp excluded-address 192.168.10.201 192.168.10.202
!
ip dhcp pool Students
network 192.168.10.0 255.255.255.0
default-router 192.168.10.1
domain-name CCNA2.Lab-11.6.1
!
interface Loopback0
ip address 10.10.1.1 255.255.255.0
!
interface GigabitEthernet0/0/1
© 2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of www.netacad.com
18
Lab - Switch Security Configuration
description Link to S1 Port 5
ip dhcp relay information trusted
ip address 192.168.10.1 255.255.255.0
no shutdown
!
line con 0
logging synchronous
exec-timeout 0 0
b. Verify the running-configuration on R1 using the following command:
R1# show ip interface brief
c. Configure interface descriptions for the ports that are in use in S1 and S2.
© 2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of www.netacad.com
18
Lab - Switch Security Configuration
d. Set the default-gateway for the Management VLAN to 192.168.10.1 on both switches.
Step 3: Configure VLAN 333 with the name Native on S1 and S2.
© 2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 5 of www.netacad.com
18
Lab - Switch Security Configuration
Step 4: Configure VLAN 999 with the name ParkingLot on S1 and S2.
© 2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 6 of www.netacad.com
18
Lab - Switch Security Configuration
© 2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 7 of www.netacad.com
18
Lab - Switch Security Configuration
© 2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 8 of www.netacad.com
18
Lab - Switch Security Configuration
Step 2: Configure access ports.
a. On S1, configure F0/5 and F0/6 as access ports that are associated with VLAN 10.
b. On S2, configure F0/18 as an access port that is associated with VLAN 10.
b. Verify that unused ports are disabled and associated with VLAN 999 by issuing the show command.
S1# show interfaces status
© 2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 9 of www.netacad.com
18
Lab - Switch Security Configuration
© 2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 10 of www.netacad.com
18
Lab - Switch Security Configuration
© 2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 11 of www.netacad.com
18
Lab - Switch Security Configuration
© 2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 12 of www.netacad.com
18
Lab - Switch Security Configuration
c. Enable port security for F0/18 on S2. Configure the port to add MAC addresses learned on the port
automatically to the running configuration.
© 2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 13 of www.netacad.com
18
Lab - Switch Security Configuration
© 2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 14 of www.netacad.com
18
Lab - Switch Security Configuration
b. Configure the trunk port on S2 as a trusted port.
c. Limit the untrusted port, F18 on S2, to five DHCP packets per second.
e. From the command prompt on PC-B, release and then renew the IP address.
C:\Users\Student> ipconfig /release
C:\Users\Student> ipconfig /renew
© 2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 15 of www.netacad.com
18
Lab - Switch Security Configuration
f. Verify the DHCP snooping binding using the show ip dhcp snooping binding command.
S2# show ip dhcp snooping binding
MacAddress IpAddress Lease(sec) Type VLAN Interface
© 2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 16 of www.netacad.com
18
Lab - Switch Security Configuration
Reflection Questions
1. In reference to Port Security on S2, why is there no timer value for the remaining age in minutes when sticky
learning was configured?
This switch does not support aging for sticky secure MAC addresses, meaning once a sticky
address is learned and bound to a port, it will remain in the configuration until it is manually
removed, regardless of any aging settings.
2. In reference to Port Security on S2, if you load the running-config script on S2, why will PC-B on port 18 never
get an IP address via DHCP?
Port security is configured to allow only two MAC addresses, and port 18 currently has two "sticky"
MAC addresses bound to it. The violation mode is set to "protect," which means that if any additional
unauthorized MAC addresses attempt to access the port, the traffic from those addresses will simply
be dropped without generating console or syslog messages, and without increasing the violation
counter.
© 2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 17 of www.netacad.com
18
Lab - Switch Security Configuration
3. In reference to Port Security, what is the difference between the absolute aging type and inactivity aging
type?
If the inactivity aging type is configured, secure addresses on the port will be removed only if
there is no data traffic from those secure source addresses within the specified time interval. On
the other hand, if the absolute aging type is set, all secure addresses on the port will age out
automatically once the defined time period expires, regardless of any ongoing activity.
© 2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 18 of www.netacad.com
18