Soumettre la recherche
Mettre en ligne
CCNA Lab 2-Configuring a Switch Part II
•
5 j'aime
•
1,396 vues
Amir Jafari
Suivre
Cisco CCNA Routing and Switching 200-120 Configuring a Switch Part II
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 10
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
CCNA Lab 1-Configuring a Switch Part I
CCNA Lab 1-Configuring a Switch Part I
Amir Jafari
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
Amir Jafari
CCNA Lab 3-VLAN Configuration on Switch
CCNA Lab 3-VLAN Configuration on Switch
Amir Jafari
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
Vuz Dở Hơi
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
Nil Menon
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
Nil Menon
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
Nil Menon
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
Nil Menon
Recommandé
CCNA Lab 1-Configuring a Switch Part I
CCNA Lab 1-Configuring a Switch Part I
Amir Jafari
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
Amir Jafari
CCNA Lab 3-VLAN Configuration on Switch
CCNA Lab 3-VLAN Configuration on Switch
Amir Jafari
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
Vuz Dở Hơi
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
Nil Menon
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
Nil Menon
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
Nil Menon
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
Nil Menon
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3
Nil Menon
Ccna command
Ccna command
Siddhartha Rajbhatt
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
Nil Menon
CCNA Lab Guide
CCNA Lab Guide
Salachudin Emir
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
Nil Menon
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
Nil Menon
MikroTik MTCNA
MikroTik MTCNA
Ali Layth
How to configure port security in cisco switch
How to configure port security in cisco switch
IT Tech
CCNA Security 02- fundamentals of network security
CCNA Security 02- fundamentals of network security
Ahmed Habib
Cisco Wireless LAN Controller (WLC)
Cisco Wireless LAN Controller (WLC)
I Putu Hariyadi
CCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
Dsunte Wilson
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11
Nil Menon
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
Vuz Dở Hơi
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
Nil Menon
Cisco ASA
Cisco ASA
Thomas Moegli
Basic Cisco 800 Router Configuration for Internet Access
Basic Cisco 800 Router Configuration for Internet Access
Harris Andrea
CCNA Product Overview.pptx
CCNA Product Overview.pptx
KISHOYIANKISH
Ccna cheat sheet
Ccna cheat sheet
aromal4frnz
Cisco switch commands cheat sheet
Cisco switch commands cheat sheet
3Anetwork com
CCNA
CCNA
Abhishek Parihari
CCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN Routing
Amir Jafari
Cisco CCNA v5 Lab
Cisco CCNA v5 Lab
ant09_sain
Contenu connexe
Tendances
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3
Nil Menon
Ccna command
Ccna command
Siddhartha Rajbhatt
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
Nil Menon
CCNA Lab Guide
CCNA Lab Guide
Salachudin Emir
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
Nil Menon
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
Nil Menon
MikroTik MTCNA
MikroTik MTCNA
Ali Layth
How to configure port security in cisco switch
How to configure port security in cisco switch
IT Tech
CCNA Security 02- fundamentals of network security
CCNA Security 02- fundamentals of network security
Ahmed Habib
Cisco Wireless LAN Controller (WLC)
Cisco Wireless LAN Controller (WLC)
I Putu Hariyadi
CCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
Dsunte Wilson
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11
Nil Menon
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
Vuz Dở Hơi
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
Nil Menon
Cisco ASA
Cisco ASA
Thomas Moegli
Basic Cisco 800 Router Configuration for Internet Access
Basic Cisco 800 Router Configuration for Internet Access
Harris Andrea
CCNA Product Overview.pptx
CCNA Product Overview.pptx
KISHOYIANKISH
Ccna cheat sheet
Ccna cheat sheet
aromal4frnz
Cisco switch commands cheat sheet
Cisco switch commands cheat sheet
3Anetwork com
CCNA
CCNA
Abhishek Parihari
Tendances
(20)
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3
Ccna command
Ccna command
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA Lab Guide
CCNA Lab Guide
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
MikroTik MTCNA
MikroTik MTCNA
How to configure port security in cisco switch
How to configure port security in cisco switch
CCNA Security 02- fundamentals of network security
CCNA Security 02- fundamentals of network security
Cisco Wireless LAN Controller (WLC)
Cisco Wireless LAN Controller (WLC)
CCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
Cisco ASA
Cisco ASA
Basic Cisco 800 Router Configuration for Internet Access
Basic Cisco 800 Router Configuration for Internet Access
CCNA Product Overview.pptx
CCNA Product Overview.pptx
Ccna cheat sheet
Ccna cheat sheet
Cisco switch commands cheat sheet
Cisco switch commands cheat sheet
CCNA
CCNA
En vedette
CCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN Routing
Amir Jafari
Cisco CCNA v5 Lab
Cisco CCNA v5 Lab
ant09_sain
Vlans
Vlans
1 2d
Smart powetr grids
Smart powetr grids
Amir Jafari
Designing Clocked Synchronous State Machine
Designing Clocked Synchronous State Machine
Abhilash Nair
CCNA- part 9 vlan
CCNA- part 9 vlan
Sandeep Sharma IIMK Smart City,IoT,Bigdata,Cloud,BI,DW
Ccna 4 final lab switchi
Ccna 4 final lab switchi
Leandro Uglar
CCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network Associate
Amir Jafari
CCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking Models
Amir Jafari
234821765 ccna-virtual-lab
234821765 ccna-virtual-lab
ITALTEL S.A.C
Convolutional Codes And Their Decoding
Convolutional Codes And Their Decoding
Kakali Saharia
Lab can ban ccna
Lab can ban ccna
Nguyen Huu Thien An
Sequential circuits in digital logic design
Sequential circuits in digital logic design
Nallapati Anindra
Sequential Logic Circuit
Sequential Logic Circuit
Ramasubbu .P
50400699 cisco-certified-network-administrator
50400699 cisco-certified-network-administrator
Naresh Gotad
Synchronous state machines. Moore and Mealy state machines (FSM)
Synchronous state machines. Moore and Mealy state machines (FSM)
Mumbi Chishimba
Finite State Machines
Finite State Machines
Basel Mansour
synchronous state machine design
synchronous state machine design
Adarsh Patel
Analysis of state machines
Analysis of state machines
Abhilash Nair
lab1
lab1
guest575c3e
En vedette
(20)
CCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN Routing
Cisco CCNA v5 Lab
Cisco CCNA v5 Lab
Vlans
Vlans
Smart powetr grids
Smart powetr grids
Designing Clocked Synchronous State Machine
Designing Clocked Synchronous State Machine
CCNA- part 9 vlan
CCNA- part 9 vlan
Ccna 4 final lab switchi
Ccna 4 final lab switchi
CCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network Associate
CCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking Models
234821765 ccna-virtual-lab
234821765 ccna-virtual-lab
Convolutional Codes And Their Decoding
Convolutional Codes And Their Decoding
Lab can ban ccna
Lab can ban ccna
Sequential circuits in digital logic design
Sequential circuits in digital logic design
Sequential Logic Circuit
Sequential Logic Circuit
50400699 cisco-certified-network-administrator
50400699 cisco-certified-network-administrator
Synchronous state machines. Moore and Mealy state machines (FSM)
Synchronous state machines. Moore and Mealy state machines (FSM)
Finite State Machines
Finite State Machines
synchronous state machine design
synchronous state machine design
Analysis of state machines
Analysis of state machines
lab1
lab1
Similaire à CCNA Lab 2-Configuring a Switch Part II
1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618)
Mohmed Abou Elenein Attia
Security Concerns in LANs.pptx
Security Concerns in LANs.pptx
joko
Chapter 13 : Introduction to switched networks
Chapter 13 : Introduction to switched networks
teknetir
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
galerussel59292
Cap2 configuring switch
Cap2 configuring switch
Hector Camba Lainez
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
Vuz Dở Hơi
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched Networks
Yaser Rahmati
KPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_final
Fisal Anwari
PROYECTO VLANS
PROYECTO VLANS
rubendavidsuarez
Exercise 4c stp rapid pvst+ question
Exercise 4c stp rapid pvst+ question
sufi1248
Day 13.1..1 catalyst switch
Day 13.1..1 catalyst switch
CYBERINTELLIGENTS
Cisco systems hacking layer 2 ethernet switches
Cisco systems hacking layer 2 ethernet switches
KJ Savaliya
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Sumutiu Marius
Ccna lab manual 640 802
Ccna lab manual 640 802
manikkan
Network topology by essay corp uk
Network topology by essay corp uk
Johnsmith5188
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
ssusercbaa33
TitleABC123 Version X1Film ListPSYCH650 Version 2.docx
TitleABC123 Version X1Film ListPSYCH650 Version 2.docx
juliennehar
Hướng dẫn cài đặt switch planet layer 3
Hướng dẫn cài đặt switch planet layer 3
3c telecom
Id. 01 router (computing)
Id. 01 router (computing)
Rawa KirKuKi
R1
R1
Tuan Nguyen
Similaire à CCNA Lab 2-Configuring a Switch Part II
(20)
1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618)
Security Concerns in LANs.pptx
Security Concerns in LANs.pptx
Chapter 13 : Introduction to switched networks
Chapter 13 : Introduction to switched networks
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
Cap2 configuring switch
Cap2 configuring switch
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched Networks
KPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_final
PROYECTO VLANS
PROYECTO VLANS
Exercise 4c stp rapid pvst+ question
Exercise 4c stp rapid pvst+ question
Day 13.1..1 catalyst switch
Day 13.1..1 catalyst switch
Cisco systems hacking layer 2 ethernet switches
Cisco systems hacking layer 2 ethernet switches
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Ccna lab manual 640 802
Ccna lab manual 640 802
Network topology by essay corp uk
Network topology by essay corp uk
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
TitleABC123 Version X1Film ListPSYCH650 Version 2.docx
TitleABC123 Version X1Film ListPSYCH650 Version 2.docx
Hướng dẫn cài đặt switch planet layer 3
Hướng dẫn cài đặt switch planet layer 3
Id. 01 router (computing)
Id. 01 router (computing)
R1
R1
Plus de Amir Jafari
CCNA R&S-20-Configuring IPv4 Addresses and Routes
CCNA R&S-20-Configuring IPv4 Addresses and Routes
Amir Jafari
CCNA R&S-19-Operating Cisco Routers
CCNA R&S-19-Operating Cisco Routers
Amir Jafari
CCNA R&S-18-Analyzing Existing Subnets
CCNA R&S-18-Analyzing Existing Subnets
Amir Jafari
CCNA R&S-17-Analyzing Subnet Masks
CCNA R&S-17-Analyzing Subnet Masks
Amir Jafari
CCNA R&S-16-Analyzing Classful IPv4 Networks
CCNA R&S-16-Analyzing Classful IPv4 Networks
Amir Jafari
CCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 Subnetting
Amir Jafari
CCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol Implementation
Amir Jafari
CCNA R&S-12-Spanning Tree Protocol Concepts
CCNA R&S-12-Spanning Tree Protocol Concepts
Amir Jafari
CCNA R&S-11-Troubleshooting Ethernet LANs
CCNA R&S-11-Troubleshooting Ethernet LANs
Amir Jafari
CCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANs
Amir Jafari
CCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet Switching
Amir Jafari
CCNA R&S-06-Fundamentals of TCP-IP Transport and Applications
CCNA R&S-06-Fundamentals of TCP-IP Transport and Applications
Amir Jafari
CCCNA R&S-04-Fundamentals of WANs
CCCNA R&S-04-Fundamentals of WANs
Amir Jafari
CCCNA R&S-03-Fundamentals of Ethernet LANs
CCCNA R&S-03-Fundamentals of Ethernet LANs
Amir Jafari
Network design
Network design
Amir Jafari
CCNA Voice 640-461- Part 4 historic voice-digital connectivity-part 2
CCNA Voice 640-461- Part 4 historic voice-digital connectivity-part 2
Amir Jafari
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
Amir Jafari
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Amir Jafari
Plus de Amir Jafari
(18)
CCNA R&S-20-Configuring IPv4 Addresses and Routes
CCNA R&S-20-Configuring IPv4 Addresses and Routes
CCNA R&S-19-Operating Cisco Routers
CCNA R&S-19-Operating Cisco Routers
CCNA R&S-18-Analyzing Existing Subnets
CCNA R&S-18-Analyzing Existing Subnets
CCNA R&S-17-Analyzing Subnet Masks
CCNA R&S-17-Analyzing Subnet Masks
CCNA R&S-16-Analyzing Classful IPv4 Networks
CCNA R&S-16-Analyzing Classful IPv4 Networks
CCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-12-Spanning Tree Protocol Concepts
CCNA R&S-12-Spanning Tree Protocol Concepts
CCNA R&S-11-Troubleshooting Ethernet LANs
CCNA R&S-11-Troubleshooting Ethernet LANs
CCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-06-Fundamentals of TCP-IP Transport and Applications
CCNA R&S-06-Fundamentals of TCP-IP Transport and Applications
CCCNA R&S-04-Fundamentals of WANs
CCCNA R&S-04-Fundamentals of WANs
CCCNA R&S-03-Fundamentals of Ethernet LANs
CCCNA R&S-03-Fundamentals of Ethernet LANs
Network design
Network design
CCNA Voice 640-461- Part 4 historic voice-digital connectivity-part 2
CCNA Voice 640-461- Part 4 historic voice-digital connectivity-part 2
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Dernier
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
RankYa
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
LoriGlavin3
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
charlottematthew16
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Rizwan Syed
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
charlottematthew16
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Lars Bell
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
NavinnSomaal
Dernier
(20)
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
CCNA Lab 2-Configuring a Switch Part II
1.
amir-jafari.com ©2015 Amir Jafari
– www.amir-Jafari.com. All rights reserved. Page 1 of 10 CCNA Lab 2: Configuring a Switch Part II
2.
amir-jafari.com ©2015 Amir Jafari
– www.amir-Jafari.com. All rights reserved. Page 2 of 10 Table of Contents Page 1- Objectives...................................................................................................................................................3 2- Scenario .....................................................................................................................................................3 3- Equipment List............................................................................................................................................3 4- Topology Diagram ......................................................................................................................................4 5-Addressing Table.........................................................................................................................................4 6-Detailed Lab Steps ......................................................................................................................................5 6-1 Part 1: Prepare the Network (Cable, Erase, and Reload the Switch)...................................................5 6-1-1- Designing and Configuration ........................................................................................................5 6-1-2- Verification ....................................................................................................................................5 6-1-3 Troubleshooting .............................................................................................................................5 6-2: Part 2: Perform Basic Device Configurations ......................................................................................5 6-2-1- Designing and Configuration ........................................................................................................5 6-2-2- Verification ....................................................................................................................................6 6-3: Part 3: Configuring Port Security .........................................................................................................6 6-3-1- Designing and Configuration ........................................................................................................6 Then connect PC2 to switch port Fast Ethernet 0/20..............................................................................7 Disconnect PC1, PC2 and connect PC1 to port Fast Ethernet 0/20. Wait for the amber link light to turn green. Once it turns green, it should almost immediately turn off...........................................................7 Note: Some IOS version may require a manual shutdown command before entering the no shutdown command.................................................................................................................................................7 6-3-2- Verification ....................................................................................................................................8 6-4: Part 4: Configure Switch to Accept Incoming SSH Connections.........................................................8 6-3-1- Designing and Configuration ........................................................................................................8 6-3-2- Verification ....................................................................................................................................9
3.
amir-jafari.com ©2015 Amir Jafari
– www.amir-Jafari.com. All rights reserved. Page 3 of 10 1- Objectives Configure basic switch port security Manage the MAC address table Configuring SSH to remotely connect to other devices 2- Scenario This lab introduces you the basic switch port security configuration and configuring the Switch to accept incoming SSH connections. 3- Equipment List Cisco Catalyst 2960 Switch with Cisco IOS Release 12.2. The Cisco implementation of SSH requires Cisco IOS Software to support RSA authentication and minimum DES encryption—a cryptographic software image. Two PCs that will run Windows XP or later
4.
amir-jafari.com ©2015 Amir Jafari
– www.amir-Jafari.com. All rights reserved. Page 4 of 10 4- Topology Diagram 5-Addressing Table Device Interface IP Address Subnet Mask Defualt Gateway PC1 NIC 172.17.99.21 255.255.255.0 172.17.99.1 PC2 NIC 172.17.99.32 255.255.255.0 172.17.99.1 S1 VLAN 1 172.17.99.11 255.255.255.0 172.17.99.1
5.
amir-jafari.com ©2015 Amir Jafari
– www.amir-Jafari.com. All rights reserved. Page 5 of 10 6-Detailed Lab Steps 6-1 Part 1: Prepare the Network (Cable, Erase, and Reload the Switch) 6-1-1- Designing and Configuration Step 1: Cable a network Cable a network that is similar to the one in the topology diagram. Create a console connection to the switch. Step 2: Clear the configuration on the switch Clear the configuration on the switch based on the “CCNA Lab 1-Configuring a Switch Part I”, Detailed Lab Steps, Part 1. 6-1-2- Verification Do the verification based on the “CCNA Lab 1-Configuring a Switch Part I”, Detailed Lab Steps, Part 1. 6-1-3 Troubleshooting Do the troubleshooting based on the “CCNA Lab 1-Configuring a Switch Part I”, Detailed Lab Steps, Part 1. 6-2: Part 2: Perform Basic Device Configurations 6-2-1- Designing and Configuration Perform Basic Device Configurations based on the “CCNA Lab 1-Configuring a Switch Part I”, Detailed Lab Steps, Part 2.
6.
amir-jafari.com ©2015 Amir Jafari
– www.amir-Jafari.com. All rights reserved. Page 6 of 10 6-2-2- Verification Do the verification based on the “CCNA Lab 1-Configuring a Switch Part I”, Detailed Lab Steps, Detailed Lab Steps, Part 2. 6-3: Part 3: Configuring Port Security 6-3-1- Designing and Configuration Step 1: Configure hosts Set the IP address, subnet mask and default gateway for PC1 and PC2 based on the address table. Do not connect PC2 to the switch yet. Step 2: Configure port security on an access port (Learn the MAC addresses dynamically) Configure switch port Fast Ethernet 0/18 to accept only two devices, to learn the MAC addresses of those devices dynamically, and to block traffic from invalid hosts if a violation occurs. S1(config)#interface fastethernet 0/18 S1(config-if)#switchport mode access S1(config-if)#switchport port-security S1(config-if)#switchport port-security maximum 2 S1(config-if)#switchport port-security mac-address sticky S1(config-if)#switchport port-security violation restrict S1(config-if)#exit Step 3: Configure port security on an access port (Set a specific secure MAC address) Configure switch port Fast Ethernet 0/20 to accept only one device, to Sets a specific secure MAC address, and to block traffic from invalid hosts if a violation occurs. Default Port Security Configuration is as follow:
7.
amir-jafari.com ©2015 Amir Jafari
– www.amir-Jafari.com. All rights reserved. Page 7 of 10 Feature Deafault Setting Port Security Disable Maximum number of secure MAC address 1 Violation mode Shutdown So when you do not set the violation and maximum MAC address, the default setting will be considered. S1(config)#interface fastethernet 0/20 S1(config-if)#switchport mode access S1(config-if)#switchport port-security S1(config-if)#switchport port-security mac-address mac-address (PC2 MAC address) S1(config-if)#exit Then connect PC2 to switch port Fast Ethernet 0/20. Step 4: Introduce a rogue host Disconnect PC1, PC2 and connect PC1 to port Fast Ethernet 0/20. Wait for the amber link light to turn green. Once it turns green, it should almost immediately turn off. Step 5: Reactivate the port If a security violation occurs and the port is shut down, you can use the no shutdown command to reactivate it. However, as long as the rogue host is attached to Fast Ethernet 0/20, any traffic from the host disables the port. Reconnect PC2 to Fast Ethernet 0/20, and enter the following commands on the switch: S1# configure terminal S1(config)#interface fastethernet 0/20 S1(config-if)# no shutdown S1(config-if)#exit Note: Some IOS version may require a manual shutdown command before entering the no shutdown command.
8.
amir-jafari.com ©2015 Amir Jafari
– www.amir-Jafari.com. All rights reserved. Page 8 of 10 6-3-2- Verification Step 1: Verify the results Show the port security settings. S1#show port-security Step 2: Examine the running configuration file With sticky secure MAC addresses feature, port security learns the MAC addresses off each port and stores those in the port security configuration (in the running-config file). Port security does not save the configuration of the sticky addresses, so use the copy running-config startup-config command if desired. S1#show running-config Step 3: Determine the MAC addresses that the switch has learned Any MAC addresses associated with a port on which port security is enabled show up as static MAC addresses. S1#show mac-address-table 6-4: Part 4: Configure Switch to Accept Incoming SSH Connections 6-3-1- Designing and Configuration Step 1: Creates a locally significant username/ password combination To work, SSH requires a local username database. S1(config)#username cisco password class Step 2: Configure the vty lines to use usernames Tell Switch to require SSH connections to use a locally configured username/password pair.
9.
amir-jafari.com ©2015 Amir Jafari
– www.amir-Jafari.com. All rights reserved. Page 9 of 10 S1(config)#line vty 0 15 S1(config-line)#login local S1(config-line)#exit Step 3: Creates a host domain for the Switch To work, SSH requires a local IP domain. S1(config)#ip domain-name cisco.com Step 4: Create the encryption keys Enables the SSH server for local and remote authentication on the switch and generates an RSA key pair. S1(config)#crypto key generate rsa How many bits in the modulus [512]: 1024 Step 5: Enable SSH Version 2 S1(config)#ip ssh version 2 Step 6: Disable support for inbound Telnet connections The switch supports both Telnet and SSH on the vty lines, but you can disable Telnet for tighter security. S1(config)#line vty 0 15 S1(config-line)#transport input ssh 6-3-2- Verification Step 1: Examine the running configuration file S1#show running-config Step 2: The status information about the SSH server The show ip ssh command lists status information about the SSH server itself. S1#show ip ssh
10.
amir-jafari.com ©2015 Amir Jafari
– www.amir-Jafari.com. All rights reserved. Page 10 of 10 Step 3: Information about each SSH client The show ssh command then lists information about each SSH client currently connected into the switch. S1#show ssh Step 4: Displays who is connected remotely to Switch This command lists all users logged in to the Swtich, including users at the console, and those connecting using both Telnet and SSH. S1#show users Step 5: Disconnects the remote user connected to Swtich on line x The line number is listed in the output gained from the show users command. S1#clear line x
Télécharger maintenant