SlideShare una empresa de Scribd logo
1 de 38
Configure a Switch   LAN Switching and Wireless   – Chapter 2
Objectives ,[object Object],[object Object],[object Object],[object Object]
Summarize the operation of Ethernet as defined for 100/1000 Mbps LANs in the IEEE 802.3 standard ,[object Object]
Summarize the operation of Ethernet as defined for 100/1000 Mbps LANs in the IEEE 802.3 standard ,[object Object]
Summarize the operation of Ethernet as defined for 100/1000 Mbps LANs in the IEEE 802.3 standard ,[object Object]
[object Object],Explain the Functions that Enable a Switch to Forward Ethernet Frames in a LAN
Explain the Functions that Enable a Switch to Forward Ethernet Frames in a LAN ,[object Object]
Explain the Functions that Enable a Switch to Forward Ethernet Frames in a LAN ,[object Object]
Explain the Functions that Enable a Switch to Forward Ethernet Frames in a LAN ,[object Object]
Configure a Switch for Operation in a Network ,[object Object]
Configure a Switch for Operation in a Network ,[object Object]
Configure a Switch for Operation in a Network ,[object Object]
Configure a Switch for Operation in a Network ,[object Object]
Configure a Switch for Operation in a Network
Configure a Switch for Operation in a Network ,[object Object]
Configure a Switch for Operation in a Network ,[object Object]
Configure a Switch for Operation in a Network ,[object Object]
Configure Basic Security on a Switch ,[object Object]
[object Object],Configure Basic Security on a Switch
How to configure Telnet and SSH on a switch
[object Object],Configure Basic Security on a Switch
[object Object],Configure Basic Security on a Switch
[object Object],Configure Basic Security on a Switch
Configure Basic Security on a Switch
MAC Flooding  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Suggested Mitigation for MAC Flood Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Configuring Port Security on a Switch  ,[object Object],[object Object],[object Object],[object Object],Switch(config-if)# switchport port-security  [maximum  value ] violation {protect | restrict | shutdown} mac-address  mac-address
Port Security: Static, Dynamic, Both ,[object Object],[object Object],[object Object],[object Object],[object Object]
Port Security: Static Addresses ,[object Object],[object Object],Switch(config-if)# switchport port-security mac-address 0000.0000.000a Switch(config-if)# switchport port-security mac-address 0000.0000.000b  Switch(config-if)# switchport port-security mac-address 0000.0000.000c
Port Security: Maximum of 1 ,[object Object],[object Object],Switch(config-if)# switchport port-security maximum 1
Port Security: Violation ,[object Object],[object Object]
Port Security: Secure MAC Addresses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Port Security: Steps
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Port Security: Violation ,[object Object],[object Object],[object Object],[object Object],[object Object],Switch(config-if)#switchport port-security violation {protect | restrict | shutdown}
Port Security: Verify Switch# show port-security   ,[object Object],Switch# show port-security Secure Port  MaxSecureAddr  CurrentAddr  SecurityViolation  Security Action   (Count)  (Count)  (Count) ---------------------------------------------------------------------------   Fa5/1  11  11  0  Shutdown Fa5/5  15  5  0  Restrict Fa5/11  5  4  0  Protect --------------------------------------------------------------------------- Total Addresses in System: 21 Max Addresses limit in System: 128
Port Security: Verify Switch# show port-security  interface  type mod/port ,[object Object],Switch# show port-security interface fastethernet 5/1 Port Security: Enabled Port status: SecureUp Violation mode: Shutdown Maximum MAC Addresses: 11 Total MAC Addresses: 11 Configured MAC Addresses: 3 Aging time: 20 mins Aging type: Inactivity SecureStatic address aging: Enabled Security Violation count: 0
Port Security: Verify Switch# show port-security  address ,[object Object],Switch# show port-security address   Secure Mac Address Table ------------------------------------------------------------------- Vlan  Mac Address  Type  Ports  Remaining Age   (mins) ----  -----------  ----  -----  ------------- 1  0001.0001.0001  SecureDynamic  Fa5/1  15 (I) 1  0001.0001.0002  SecureDynamic  Fa5/1  15 (I) 1  0001.0001.1111  SecureConfigured  Fa5/1  16 (I) 1  0001.0001.1112  SecureConfigured  Fa5/1  - 1  0001.0001.1113  SecureConfigured  Fa5/1  - 1  0005.0005.0001  SecureConfigured  Fa5/5  23 1  0005.0005.0002  SecureConfigured  Fa5/5  23 1  0005.0005.0003  SecureConfigured  Fa5/5  23 1  0011.0011.0001  SecureConfigured  Fa5/11  25 (I) 1  0011.0011.0002  SecureConfigured  Fa5/11  25 (I) ------------------------------------------------------------------- Total Addresses in System: 10 Max Addresses limit in System: 128

Más contenido relacionado

La actualidad más candente

6.5.1.2 packet tracer layer 2 security instructor
6.5.1.2 packet tracer   layer 2 security instructor6.5.1.2 packet tracer   layer 2 security instructor
6.5.1.2 packet tracer layer 2 security instructor
Salem Trabelsi
 
How to create and delete vlan on cisco catalyst switch
How to create and delete vlan on cisco catalyst switchHow to create and delete vlan on cisco catalyst switch
How to create and delete vlan on cisco catalyst switch
IT Tech
 
ccna-discowey-final-100
 ccna-discowey-final-100 ccna-discowey-final-100
ccna-discowey-final-100
junkut3
 

La actualidad más candente (20)

Ccna PPT2
Ccna PPT2Ccna PPT2
Ccna PPT2
 
6.5.1.2 packet tracer layer 2 security instructor
6.5.1.2 packet tracer   layer 2 security instructor6.5.1.2 packet tracer   layer 2 security instructor
6.5.1.2 packet tracer layer 2 security instructor
 
CCNA ppt Day 7
CCNA ppt Day 7CCNA ppt Day 7
CCNA ppt Day 7
 
Basic Cisco 800 Router Configuration for Internet Access
Basic Cisco 800 Router Configuration for Internet AccessBasic Cisco 800 Router Configuration for Internet Access
Basic Cisco 800 Router Configuration for Internet Access
 
Acl
AclAcl
Acl
 
Access Control List & its Types
Access Control List & its TypesAccess Control List & its Types
Access Control List & its Types
 
How to Configure Private VLANs on Cisco Switches
How to Configure Private VLANs on Cisco SwitchesHow to Configure Private VLANs on Cisco Switches
How to Configure Private VLANs on Cisco Switches
 
Cisco CCNA Port Security
Cisco CCNA Port SecurityCisco CCNA Port Security
Cisco CCNA Port Security
 
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID ConfusionHuawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
 
Ch6
Ch6Ch6
Ch6
 
Cisco commands List for Beginners (CCNA, CCNP)
Cisco commands List for Beginners (CCNA, CCNP)Cisco commands List for Beginners (CCNA, CCNP)
Cisco commands List for Beginners (CCNA, CCNP)
 
Ccna Commands In 10 Minutes
Ccna Commands In 10 MinutesCcna Commands In 10 Minutes
Ccna Commands In 10 Minutes
 
Huawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatch
Huawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatchHuawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatch
Huawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatch
 
Securing Switch Access
Securing Switch Access Securing Switch Access
Securing Switch Access
 
Brkcrt 2214
Brkcrt 2214Brkcrt 2214
Brkcrt 2214
 
Mitigating Layer2 Attacks
Mitigating Layer2 AttacksMitigating Layer2 Attacks
Mitigating Layer2 Attacks
 
CCNA - Routing & Switching Commands
CCNA - Routing & Switching CommandsCCNA - Routing & Switching Commands
CCNA - Routing & Switching Commands
 
Nat mikrotik
Nat mikrotikNat mikrotik
Nat mikrotik
 
How to create and delete vlan on cisco catalyst switch
How to create and delete vlan on cisco catalyst switchHow to create and delete vlan on cisco catalyst switch
How to create and delete vlan on cisco catalyst switch
 
ccna-discowey-final-100
 ccna-discowey-final-100 ccna-discowey-final-100
ccna-discowey-final-100
 

Destacado

CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
Dsunte Wilson
 

Destacado (20)

Cap3 vla ns
Cap3   vla nsCap3   vla ns
Cap3 vla ns
 
Server Locality Using Razor and LLDP - PuppetConf 2014
Server Locality Using Razor and LLDP - PuppetConf 2014Server Locality Using Razor and LLDP - PuppetConf 2014
Server Locality Using Razor and LLDP - PuppetConf 2014
 
ACIT - CCNA Training Course Topic - Switch Stp ACIT
ACIT - CCNA Training Course Topic - Switch Stp ACITACIT - CCNA Training Course Topic - Switch Stp ACIT
ACIT - CCNA Training Course Topic - Switch Stp ACIT
 
Cap5 stp
Cap5   stpCap5   stp
Cap5 stp
 
Présentation etherchannel
Présentation etherchannelPrésentation etherchannel
Présentation etherchannel
 
Ether channel fundamentals
Ether channel fundamentalsEther channel fundamentals
Ether channel fundamentals
 
EtherChannel PAgP and LACP modes
EtherChannel PAgP and LACP modesEtherChannel PAgP and LACP modes
EtherChannel PAgP and LACP modes
 
Trend Report: Emerging Technologies
Trend Report: Emerging TechnologiesTrend Report: Emerging Technologies
Trend Report: Emerging Technologies
 
Cap6 intervlan routing
Cap6   intervlan routingCap6   intervlan routing
Cap6 intervlan routing
 
Cap4 implementing vtp
Cap4   implementing vtpCap4   implementing vtp
Cap4 implementing vtp
 
Day 14.2 inter vlan
Day 14.2 inter vlanDay 14.2 inter vlan
Day 14.2 inter vlan
 
Cap1 lan design
Cap1   lan designCap1   lan design
Cap1 lan design
 
An introduction to SwiftNET
An introduction to SwiftNETAn introduction to SwiftNET
An introduction to SwiftNET
 
Introduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigationIntroduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigation
 
Cap7 wireless
Cap7   wirelessCap7   wireless
Cap7 wireless
 
Ipv4
Ipv4Ipv4
Ipv4
 
EtherChannel
EtherChannelEtherChannel
EtherChannel
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)
 
Vlan
Vlan Vlan
Vlan
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 

Similar a Cap2 configuring switch

Configuring dynamic switchport security
Configuring dynamic switchport securityConfiguring dynamic switchport security
Configuring dynamic switchport security
IT Tech
 
Ccna 3 chapter 2 v4.0 answers 2011
Ccna 3 chapter 2 v4.0 answers 2011Ccna 3 chapter 2 v4.0 answers 2011
Ccna 3 chapter 2 v4.0 answers 2011
Dân Chơi
 
KPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_finalKPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_final
Fisal Anwari
 

Similar a Cap2 configuring switch (20)

Security Concerns in LANs.pptx
Security Concerns in LANs.pptxSecurity Concerns in LANs.pptx
Security Concerns in LANs.pptx
 
SRWE_Module_11.pptx
SRWE_Module_11.pptxSRWE_Module_11.pptx
SRWE_Module_11.pptx
 
Configuring dynamic switchport security
Configuring dynamic switchport securityConfiguring dynamic switchport security
Configuring dynamic switchport security
 
Switchport port security explained with examples
Switchport port security explained with examplesSwitchport port security explained with examples
Switchport port security explained with examples
 
How to Configure Port-Security on Cisco Switch for Enhanced Network Security ...
How to Configure Port-Security on Cisco Switch for Enhanced Network Security ...How to Configure Port-Security on Cisco Switch for Enhanced Network Security ...
How to Configure Port-Security on Cisco Switch for Enhanced Network Security ...
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
 
Ccna 3 chapter 2 v4.0 answers 2011
Ccna 3 chapter 2 v4.0 answers 2011Ccna 3 chapter 2 v4.0 answers 2011
Ccna 3 chapter 2 v4.0 answers 2011
 
VLAN
VLANVLAN
VLAN
 
Port Security
Port SecurityPort Security
Port Security
 
L2 Attacks.pdf
L2 Attacks.pdfL2 Attacks.pdf
L2 Attacks.pdf
 
1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618) 1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618)
 
Vlan
VlanVlan
Vlan
 
Lan to lan vpn
Lan to lan vpnLan to lan vpn
Lan to lan vpn
 
CCNA Security configuration
CCNA Security configurationCCNA Security configuration
CCNA Security configuration
 
Attack.pptx
Attack.pptxAttack.pptx
Attack.pptx
 
Ccna Imp Guide
Ccna Imp GuideCcna Imp Guide
Ccna Imp Guide
 
Chapter 13 : Introduction to switched networks
Chapter 13 : Introduction to switched networksChapter 13 : Introduction to switched networks
Chapter 13 : Introduction to switched networks
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
 
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksChapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched Networks
 
KPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_finalKPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_final
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 

Cap2 configuring switch

Notas del editor

  1. Graphics 2.1.1.1, 2..1.1.2, 2.1.1.3, 2.1.1.4
  2. Graphic 2.1.2.2, 2.1.2.3
  3. Graphic 2.1.3.1, 2.1.3.2 (pick some of these maybe one or 2 – whatever will fit in)
  4. Graphic 2.2.1.1
  5. Graphic 2.2.2.1
  6. Graphic 2.2.3..1
  7. Graphic 2.2.4.2
  8. Graphic 2.3.5.1
  9. Graphic 2.3.1.1
  10. Graphics 2.3.2.1 & 2.3.2.2
  11. Graphics 2.3.2.1 & 2.3.2.2
  12. Graphic 2.3.3.1 & 2.3.3.2
  13. Graphic 2.3.6.1
  14. Graphic 2.3.7.1
  15. Graphics 2.3.8.1 & 2.3.8.2
  16. All graphics for 2.4.1 pages 1 through 4
  17. Graphic 2.4.2.1 & 2.4.2.2
  18. Graphics 2.4.3.1, 2.4.3.2, 2.4.3.3
  19. All graphics in section 2.4.4
  20. Graphic 2.4.5.1
  21. Graphic 2.4.5.2
  22. Graphic 2.4.6.2