Packet Tracer - Configuring Switch Port
Security
Please click here to download topology 2.2.4.9 Packet Tracer - Configuring Switch Port Security Instructions
Topology
2.2.4.9 Packet Tracer - Configuring Switch Port Security Instructions |
Addressing Table
Device
|
Interface
|
IP Address
|
Subnet Mask
|
S1
|
VLAN 1
|
10.10.10.2
|
255.255.255.0
|
PC1
|
NIC
|
10.10.10.10
|
255.255.255.0
|
PC2
|
NIC
|
10.10.10.11
|
255.255.255.0
|
Rogue Laptop
|
NIC
|
10.10.10.12
|
255.255.255.0
|
Objective
Part 1: Configure Port Security
Part 2: Verify Port Security
Background
In this activity, you will configure and
verify port security on a switch. Port security allows you to restrict a port’s
ingress traffic by limiting the MAC addresses that are allowed to send traffic
into the port.
Part 1: Configure Port Security
a.
Access the command line
for S1 and enable port security on Fast
Ethernet ports 0/1 and 0/2.
b.
Set the maximum so that
only one device can access the Fast Ethernet ports 0/1 and 0/2.
c.
Secure the ports so that
the MAC address of a device is dynamically learned and added to the running
configuration.
d.
Set the violation so
that the Fast Ethernet ports 0/1 and 0/2 are not disabled when a violation
occurs, but packets are dropped from an unknown source.
e.
Disable
all the remaining unused ports. Hint: Use the range keyword to apply this configuration to all the ports
simultaneously.
Part 2: Verify Port Security
a.
From PC1, ping PC2.
b.
Verify port security is enabled
and the MAC addresses of PC1 and PC2 were added to the running
configuration.
c.
Attach Rogue Laptop to any unused switch port and notice that the link
lights are red.
d.
Enable the port and verify that
Rogue Laptop can ping PC1 and PC2. After verification, shut down the port connected to Rogue Laptop.
e.
Disconnect PC2 and connect Rogue Laptop
to PC2’s port. Verify that Rogue Laptop is unable to ping PC1.
f.
Display the port security
violations for the port Rogue Laptop is
connected to.
g.
Disconnect Rouge Laptop and reconnect PC2.
Verify PC2 can ping PC1.
h.
Why is PC2 able to ping PC1,
but the Rouge Laptop is not?
____________________________________________________________________________________
____________________________________________________________________________________
No comments:
Post a Comment