You are on page 1of 4

ESwitching Basic Switching/Wireless PT Practice SBA

A few things to keep in mind while completing this activity: 1. 2. ". Do not use the browser Back button or close or reload any exam windows during the exam. Do not close Packet racer when you are done. !t will close automatically. #lick the Submit Assessment button to submit your work.

Introduction
!n this practice Packet racer Practice $kills %ased Assement& you will: configure '(A)s using ' P configure inter*'(A) routing modify $ P configure port security add a wireless (A)

Device

Interface +a,-,..,

Address 1,.1,..,.1 1,.1,./,.1 1,.1,.//.1 1,.1,.0,.1 1,.1,.0,.1, 1,.1,.1,,.1 1,.1,.//.11 1,.1,.//.12 1,.1,.//.1" 1,.1,..,.1, 1,.1,..,.11 1,.1,./,.1, D3#P assigned

Subnet

ask

Default !atewa" n-a n-a n-a n-a 1,.1,.0,.1 n-a 1,.1,.//.1 1,.1,.//.1 1,.1,.//.1 1,.1,..,.1 1,.1,..,.1 1,.1,./,.1 1,.1,.1,,.1

2//.2//.2//., 2//.2//.2//., 2//.2//.2//., 2//.2//.2//., 2//.2//.2//., 2//.2//.2//., 2//.2//.2//., 2//.2//.2//., 2//.2//.2//., 2//.2//.2//., 2//.2//.2//., 2//.2//.2//., 2//.2//.2//.,

%ranch

+a,-,./, +a,-,.// +a,-,.0, !nternet 1ireless '(A) // '(A) // '(A) // )!# )!# )!# )!#

1(A) $1 $2 $" $taff 1 $taff 2 Admin 12$ P#

#ote$ he password for user 454# mode is cisco. he password for privileged 454# mode is class.

$tep 1: #onfigure the $witches for 2emote Access.


#reate& enable& and address '(A) // as the management interface on all three switches. 6se the values found in the addressing table.

$tep 2: #onfigure runking.


#ote$ Packet racer now supports the use of the range argument for the interface command. +or interfaces +ast4thernet ,-1 through +ast4thernet ,-. on all three switches: #onfigure static trunking. Assign '(A) // as the native '(A).

$tep ": #onfigure ' P and '(A)s.


a. #onfigure $1 as ' P server and the following ' P parameters: $1 is the ' P server. ' P domain name: B%A#&' ' P password: vt(branch

b. #reate and name the following '(A)s on $1. '(A) .,: $taff '(A) /,: Admin '(A) //: 7anagement '(A) 0,: 1ireless

c. #onfigure $2 and $" as ' P clients to participate in the %2A)#3 ' P domain. d. 'erify that ' P is operational.

$tep .: #onfigure !nterfaces for '(A) Access


'(A) port assignments on each switch are as follows: Device $2& $" $2& $" $" Ports +a,-1 8 ,-1, +a,-11 8 ,-19 +a,-10 Assignment ., /, 0,

a. #onfigure access ports on access layer switches.

#onfigure the appropriate interfaces on $2 and $" for access mode. Assign '(A)s according to the port assignments table.

<!--[if !supportLists]-->b. <!--[endif]-->'erify trunking and '(A) assignments.

$tep /: #onfigure $panning ree.


a. 7odify $ P root bridge elections. 6sing a priority of )**++& set $1 as the root bridge for all VLANs. 6sing a priority of ),-+.& set $2 so that it will become the root for all VLANs if $1 fails.

<!--[if !supportLists]-->b. <!--[endif]-->'erify the spanning tree election.

$tep :: #onfigure !nter*'(A) 2outing.


6se the information in the Addressing able to configure %ranch for inter*'(A) routing. %e sure to designate the native '(A). 'erify inter*'(A) routing.

$tep 9: #onfigure Port $ecurity.


#ote$ %est practice re;uires port security on all access ports. 3owever& for this practice exercise you will only configure one port with security. a. #onfigure $" with port security on +ast4thernet ,-2. 4nable port security. )o more than two 7A# addresses are allowed on the +ast4thernet ,-2 port for $". <nce learned& 7A# addresses should be automatically added to the running configuration. !f this policy is violated& the port should be automatically disabled.

<!--[if !supportLists]-->b. <!--[endif]-->'erify that port security is implemented.

$tep 0: #onfigure the 1ireless (A).


2efer to the Addressing able to configure the wireless (A). a. #onfigure 1(A). 6se static addressing on the !nternet interface.

$et the router !P and subnet mask. 6se the D3#P $erver $ettings to configure the router to provide wireless hosts with an !P address. he starting !P address in the wireless (A) subnet is 1,.1,.1,,.1/. he maximum number of users is 9/.

b. #onfigure wireless security. $et the $$!D to Branch/W0A# . 4nable 14P security and use 1)*-.2,3+4 as key1.

c. 6se branch)*- as the remote management password. d. #onfigure 12$ P# to access the wireless network that is provided by 1(A). 12$ P# uses D3#P to obtain addressing information. #ote$ !t will not be possible for devices to ping 12$ P# since 12$ P# is behind the 1(A) )A firewall.

$tep =: 'erify #onnectivity.


Although these are not scored& the following connectivity tests should be successful. $2 can ping %ranch. $" can ping %ranch Admin can ping $taff 2. 12$ P# can ping $taff 1 $taff 1 can ping Admin. $1 can ping %ranch.

You might also like