![]() Return to Realtime mode and use the following policy to establish port security just on the ports used by the PCs.Ĭonfigure the first learned MAC address to “stick” to the configuration. Normally, you configure port security on all access ports or shut down the port if it is not in use. Configure access links with port security. Task 4: Configure and Verify Port Security If not, click Check Results to see which required components are not yet completed. Your completion percentage should be 53%. From Simulation mode, observe the broadcast traffic that propagates throughout the LAN until the switches learn the ports of each PC.Clear the learned MAC addresses so that the switches must broadcast ping packets.From Simulation mode, observe the broadcast traffic. Verify that the following PCs can ping each other: Switch to Simulation mode and use the Add Simple PDU tool to create pings between PCs on the same VLAN. Verify that PCs on the same subnet can ping each other. However, activate the interface at this time with the appropriate command.Ĭonfigure the PCs with IP addressing according to the addressing table. This interface is not active until after trunking is configured later in the activity. Configure the management VLAN interface on S1, S2, and S3.Ĭonfigure VLAN 99 as the management VLAN interface on S1, S2, and S3. Configure switches with basic commands.Ĭonfigure each switch with the following basic settings. Task 3: Configure Devices and Verify Connectivity Your completion percentage should be 32%. ![]() This document is Cisco Public Information. Display names are case-sensitive.Īll contents are Copyright © 2007-2008 Cisco Systems, Inc.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |