LAN Switching and Wireless Essay Example
LAN Switching and Wireless Essay Example

LAN Switching and Wireless Essay Example

Available Only on StudyHippo
  • Pages: 8 (1940 words)
  • Published: September 13, 2017
  • Type: Case Study
View Entire Sample
Text preview

Introduction

This study is portion of an appraisal for the Cisco CCNA phase 3 class LAN Switching and Wireless. The purpose of the Skills Test is to configure a web dwelling of one router three switches and three Personal computers. The aims involve basic constellation undertakings, the constellation of VLAN Trunking Protocol VTP, Spanning Tree Protocol STP and inter-VLAN routing. The study includes web diagrams, tabular arraies and constellation infusions from the Cisco routers.

Aim

The purpose of the Skills Test is to configure a web dwelling of one router, three switches and three Personal computers. The aims include:

  • Make a web utilizing Packet Tracer 5.1 harmonizing to Network Diagram 1
  • Erase the startup constellation and recharge the router to the default province
  • Perform basic constellation undertakings on the router
  • Configure and activate interfaces
  • Configure VLAN Trunking Protocol ( VTP ) waiters and client
  • Configure VLANs on the switches
  • Configure Crossing Tree Protocol ( STP )
  • Configure inter-VLAN routing

Addressing Table

Table 1 shows assigned IP references and subnet masks for the web.

Table 1: Addressing Table

...

It should be noted that interface Fa0/0 and its bomber interfaces differ somewhat from the Skills Test turn toing tabular array, as the router from the accomplishments trial did non hold a Fa0/1 interface. Therefore, Fa0/0 was used alternatively.

4 Port Assignments

The undermentioned tabular arraies list port assignments.

Table 2: Switch 1

Device Interface IP Address Subnet Mask Default Gateway
Fa0/0 N/A N/A N/A
Fa0/0.10 172.17.10.1 255.255.255.0 N/A
R1 Fa0/0.20 172.17.20.1 255.255.255.0 N/A
Fa0/0.30 172.17.30.1 255.255.255.0 N/A
Fa0/0.99 172.17.99.1 255.255.255.0 N/A
S1 VLAN99 172.17.99.11 255.255.255.0 172.17.99.1
S2 VLAN99 172.17.99.12 255.255.255.0 172.17.99.1
S3 VLAN99 172.17.99.13 255.255.255.0 172.17.99.1
PC1 NIC 172.17.10.21 255.255.255.0 172.17.10.1
PC2 NIC 172.17.20.22 255.255.255.0 172.17.20.1
PC3 NIC 172.17.30.23 255.255.255.0 172.17.30.1
Ports Assignment Network
Fa0/1 - 0/4 802.1q Trunks ( Native VLAN99 ) 172.17.99.0/24
Fa0/5 802.1q Short pantss 172.17.99.0/24

Table 3: Switch 2

Ports Assignment Network
Fa0/1 - 0/4 802.1q Trunks ( Native VLAN99 ) 172.17.99.0/24
Fa0/6 - 0/10 VLAN30 - Guest ( Default ) 172.17.30.0/24
Fa0/11 - 0/17 VLAN10 - Faculty/Staff 172.17.10.0/24
Fa0/18 - 0/24 VLAN20 - Students 172.17.20.0/24

Table 4: Switch 3

Ports Assignment Network
Fa0/1 - 0/4 802.1q Trunks ( Native VLAN99 ) 172.17.99.0/24

Fixing the Network

The web was created utilizing Packet Tracer

View entire sample
Join StudyHippo to see entire essay

5.1 based on Network Diagram 1 [ 2 ] see Appendices. The default constellations were erased from the router and switches utilizing the bid ‘erase startup-config ' under privileged EXEC manner. The watchwords are alllake herringexcept for enable secretcategory. Harmonizing to Cisco [ 1 ] , page 89

“When configuring watchwords in the Cisco IOS CLI, by default all watchwords, except for the enable secret watchword, are stored in clear-text format within the Startup-config and running-config files” .

Passwords should non be stored in clear-text format as they can easy be viewed ; I used the Cisco IOS bid ‘service password-encryption ' to code the watchwords. The ports on devices R1, S1, S2 and S3 were deactivated utilizing the bid: ‘interface scope port/s ' followed by the bid ‘shutdown ' . The S2 active user ports were so reactivated utilizing the undermentioned bids: ‘interface scope fa0/6, fa0/11, fa0/18 ' so ‘switchport mode entree ' and ‘no closure ' . This is an illustration of best practise as it limits the figure of ports an aggressor can utilize to assail the web.

Basic Device Configurations

The devices are all configured with hostnames, message of the twenty-four hours streamers, synchronal logging ( R1 ) and encrypted watchwords. Secure Shell SSH was non used, as it is unavailable utilizing a Cisco 2960 switch in Packet Tracer 5.1. SSH is used to code messages as Telnet sends all communications across the web in clear-text. The Cisco Discovery Protocol CDP is another security exposure, as CDP messages are non encrypted. Messages contain information about the device such as the IP reference, platform, capablenesss and native VLAN. This information can be used by an aggressor

to happen feats to assail the web, all devices in this accomplishments test have CDP disabled. Tables 5 and 6 list the basic bids for devices R1, S1, S2 and S3.

Table 5: Basic Command List 1

Command Description
Switch & gt ; en Access privileged EXEC manner.
Switch # conf T Switch from privileged EXEC manner to planetary constellation manner.
Switch ( config ) # hostname S1 Delegate a hostname to the device.
S1 ( config ) # no information science domain name-lookup Command to disenable DNS host name-to-IP reference interlingual rendition.
S1 ( config ) # enable secret category Enable encrypted watchword for privileged EXEC manner.
S1 ( config ) # line con 0 Line console bid.
S1 ( config-line ) # watchword lake herring Set line console watchword.
S1 ( config-line ) # logging synchronal Enables synchronal logging
S1 ( config-line ) # login Enables line console watchword.
S1 ( config ) # line vty 0 15 Virtual terminal line bid, full terminus scope specified.
S1 ( config-line ) # watchword lake herring Set vty watchword.
S1 ( config-line ) # login Enables vty line watchword for given scope.

Table 6: Basic Command List 2

Command Description
S1 ( config ) # service password-encryption Encrypts all watchwords.
S1 ( config ) # no cdp run Disables CDP protocol.
S1 ( config ) # streamer motd `` Authorized Personnel Merely! '' Sets a message of the twenty-four hours streamer.

Confirmation

Confirmation that devices R1, S1, S2 and S3 are configured can be seen in the Appendices subdivision. The end product for the ‘show run ' bid for each device is displayed.

Configuration and Activation of Network Addresses

At this phase, the Personal computers were each assigned an IP reference and subnet mask. VTP constellation was followed by the necessary bids to make and configure the VLANs. It should be noted that interfaces: Fa0/0.10,

Fa/0.20, Fa/0.30 and Fa0/0.99 were configured subsequently during the Inter VLAN Routing phase.

Configuration of VTP

An illustration constellation of VTP on switch S1 is displayed in Table 7 ; S1 was set to server manner, S2, and S3 to client. The VTP sphere name and watchword were both set tolake herringfor all switches.

Table 7: VTP Command List

Command Description
S1 ( config ) # vtp manner waiter Delegate a manner to the switch.
S1 ( config ) # vtp manner sphere lake herring Delegate a sphere name to the switch.
S1 ( config ) # vtp watchword lake herring Delegate a watchword to the sphere.

Configuration of VLANs

Table 8 below shows the VLANs ; these were configured on switch S1 ( first two bids from Table 9 ) and propagated to S2 and S3 via the VTP waiter.

Table 8: VLAN Name callings

VLAN VLAN Name
VLAN99 direction
VLAN10 faculty-staff
VLAN20 pupils
VLAN30 invitee

Table 9 below shows the necessary bids to make a VLAN and delegate an IP reference and subnet mask to it. Individual IP references were assigned to VLAN 99 on each switch after the initial creative activity of the VLANs on S1.

Table 9: VLAN Creation

Command Description
S1 ( config ) # vlan 99 Make a given VLAN.
S1 ( config-vlan ) name direction Name the VLAN.
S1 ( config-vlan ) # issue Exit bid.
S1 ( config ) # interface vlan 99 Stipulate the interface.
S1 ( config-if ) # ip reference 172.17.10.21 255.255.255.0 Configure the given interface with an IP reference and subnet mask.
S1 ( config-if ) # no closure Activates the interface.

Once the VLANs were configured, the ports were assigned to their several VLANs. Table 30 shows the activation of bole ports with native VLAN 99 and entree ports assigned to VLAN 10 on switch S2.

Table 10: Port Assignments

Command Description
S2 ( config ) #

interface scope fa0/1-4

Specify interface scope to configure.
S2 ( config-if-range ) # switchport manner bole Specify switch port manner as bole.
S2 ( config-if-range ) # switchport bole native vlan 99 Assign native VLAN 99 to trunk.
S2 ( config-if-range ) # no closure Enable VLAN 99 interface.
S2 ( config-if-range ) # terminal Exit constellation of interfaces.
S2 ( config ) # interface scope fa0/6-10 Specify interface scope to configure.
S2 ( config-if-range ) # switchport entree vlan 30 Add selected ports to VLAN 30.

Confirmation

Confirmation that VTP is active can be seen in Figures 1-2 ; the VLANs from S1 have propagated to S2 and S3. Port assignments can besides be seen here and in the Appendices under the ‘sh tally ' bid infusion from each switch.

Configuration of STP

Cisco switches have STP enabled by default to avoid broadcast cringles. The precedence for the Bridge Identification BID can be set for each VLAN guaranting that S1 is elected as the root span. The precedence was set to the lowest increase of 4096 for each VLAN on S1. There are two bids to put a switch as a root span. The first is ‘spanning-tree vlan id root primary ' and the 2nd ‘spanning tree vlan id precedence value ' . A backup root span can besides be configured utilizing the bid ‘spanning-tree vlan id root secondary ' . Alternatively, one can utilize the precedence bid with the 2nd lowest precedence value for illustration 8192. Rapid STP is configured utilizing the undermentioned bid: ‘spanning-tree manner rapid-pvst ' . This was non used in the Packet Tracer 5.1 simulation as trial Pings failed and were merely partly successful. To work out this job I used the bid ‘spanning-tree manner pvst

' alternatively, the Pings were so wholly successful utilizing pvst.

Confirmation

Confirmation that STP has been configured can be seen in the Appendices subdivision where each switches constellation is displayed. Figure 3 below shows the Root ID precedence and shows that S1 is the root span for VLAN 99. Extra confirmation that STP is working can be seen on Network Diagram 2 under the Appendices subdivision. Orange ports are in an alternate function in a discarding province while green ports are in a designated or root port function. Full inside informations can be seen in the Appendices subdivision where each switch has its end product displayed from the ‘sh spanning-tree ' bid.

Configuration of Inter-VLAN Routing

The web required a router on a stick constellation ( see Network Diagram 1 ) due to telegraphing restrictions. Each bomber interface was assigned a VLAN with its ain IP reference and subnet mask. Hosts on VLANs frontward packets to their default gateway ( VLAN IP reference) assigned to a sub interface. The router so forwards the packages to the finish interface and visa versa enabling communicating between VLANs. Table 11 below shows bids used to configure S1 and R1, S1 must be configured in bole manner for successful communicating.

Table 11: Inter-VLAN Routing Commands

Command Description
S1 ( config-vlan ) # interface fa0/5 Configure interface.
S1 ( config-if ) # exchange port manner bole Set interface to trunk manner.
S1 ( config-if ) # switchport bole native vlan 99 Assign native VLAN 99 to trunk.
S1 ( config-if ) # no closure Enable interface.
S1 # transcript run start Transcript running constellation to get down up constellation.
R1 ( config ) # interface fa0/0.10 Make a sub interface.
R1 ( config-subif ) # encapsulation dot1q 10 VLAN assigned to

stand in interface.

R1 ( config-subif ) # ip reference 172.17.10.1 255.255.255.0 IP reference and subnet mask assigned to interface.
R1 ( config-subif ) # interface fa0/0 Configure interface.
R1 ( config-if ) # no closure Enable interface and sub interfaces under fa/0/0.
R1 # transcript run start Transcript running constellation to get down up constellation.

Confirmation

Confirmation that Inter-VLAN Routing is in consequence can be seen in the Testing subdivision where successful Pings between Personal computers on separate VLANs are made. The extract below from R1 shows the affiliated bomber interfaces listed in R1s routing tabular array.

Discussion

I found the Skills Test challenging and utile, I had a job with VTP, as VLAN updates from S1 were non propagated to S2 and S3 after initial success. I found that for some ground, each switch had been reset to Server manner whilst still being joined to the spherelake herring. I reconfigured the switches as they were before, I so found that S2 and S3 were still non having updates from S1. I so reset S2 and S3s domain names tonothingand so back tolake herring. This solved the job, as a switch will larn from being changed from the void province. I feel that the Skills Test was a success. However, I feel that I may profit in future practicals by really utilizing a Cisco switch as opposed to utilizing Packet Tracer.

Decision

The assignments ends were to the full completed ; I created the web utilizing Packet Tracer 5.1, performed basic constellations undertakings, and configured VTP, STP and inter-VLAN routing. I found the assignment disputing in peculiar to to the full document, look into and verify the web.

Mentions

Mention: 1

Wayne Lewis ( 2008 )LAN Switching and Wireless CCNA Exploration

Companion Guide1st erectile dysfunction. Indianapolis, USA: Cisco Press.

Mention: 2

RGU ( 2009 )LAN Switching and Wireless Skills Test.Aberdeen, Scotland ;

Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New