e-Portfolio for Don McClintock
CNT-2102 Switching & Wireless Fundamentals
Equipment 1 2912 or 2924 Switch (left), 1 2950 or 2960 Switch (right), 1Router with two FastEthernet interfaces and capable of trunking, 1 Cisco/Linksys Wireless Access Point, and 1 laptop with wireless capabilities. If available, and if time permits use a Cisco Wireless Card and its accompanying software.
RESULTS
Click on each link to review configs.
!
version 12.0
no service pad
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
hostname SW1
!
enable secret 5 $1$On7u$9XWjD3vAAdHqTINf7MqyU1
!
!
!
!
!
!
ip subnet-zero
no ip domain-lookup
!
!
!
interface FastEthernet0/1
description TO CISCO 1841 FA0/0
switchport trunk encapsulation dot1q
switchport trunk native vlan 99
switchport trunk allowed vlan 1,5,7,9,99,1002-1005
switchport mode trunk
!
interface FastEthernet0/2
shutdown
!
interface FastEthernet0/3
shutdown
!
interface FastEthernet0/4
shutdown
!
interface FastEthernet0/5
description PC1
switchport access vlan 5
!
interface FastEthernet0/6
description PC2
switchport access vlan 5
!
interface FastEthernet0/7
description PC3
switchport access vlan 7
!
interface FastEthernet0/8
shutdown
!
interface FastEthernet0/9
shutdown
!
interface FastEthernet0/10
shutdown
!
interface FastEthernet0/11
shutdown
!
interface FastEthernet0/12
description TRUNK to SW2
switchport trunk encapsulation dot1q
switchport trunk native vlan 99
switchport mode trunk
!
interface VLAN1
no ip directed-broadcast
no ip route-cache
shutdown
!
interface VLAN99
ip address 192.168.1.2 255.255.255.0
no ip directed-broadcast
no ip route-cache
!
ip default-gateway 192.168.1.1
banner motd NO UNAUTHORIZED ACCESS !
!
line con 0
password 7 0822455D0A16
logging synchronous
login
transport input none
stopbits 1
line vty 0 4
password 7 0822455D0A16
logging synchronous
login
line vty 5 15
password 7 0822455D0A16
logging synchronous
login
!
end
!
version 12.0
no service pad
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
hostname SW1
!
enable secret 5 $1$On7u$9XWjD3vAAdHqTINf7MqyU1
!
!
!
!
!
!
ip subnet-zero
no ip domain-lookup
!
!
!
interface FastEthernet0/1
description TO CISCO 1841 FA0/0
switchport trunk encapsulation dot1q
switchport trunk native vlan 99
switchport trunk allowed vlan 1,5,7,9,99,1002-1005
switchport mode trunk
!
interface FastEthernet0/2
shutdown
!
interface FastEthernet0/3
shutdown
!
interface FastEthernet0/4
shutdown
!
interface FastEthernet0/5
description PC1
switchport access vlan 5
!
interface FastEthernet0/6
description PC2
switchport access vlan 5
!
interface FastEthernet0/7
description PC3
switchport access vlan 7
!
interface FastEthernet0/8
shutdown
!
interface FastEthernet0/9
shutdown
!
interface FastEthernet0/10
shutdown
!
interface FastEthernet0/11
shutdown
!
interface FastEthernet0/12
description TRUNK to SW2
switchport trunk encapsulation dot1q
switchport trunk native vlan 99
switchport mode trunk
!
interface VLAN1
no ip directed-broadcast
no ip route-cache
shutdown
!
interface VLAN99
ip address 192.168.1.2 255.255.255.0
no ip directed-broadcast
no ip route-cache
!
ip default-gateway 192.168.1.1
banner motd NO UNAUTHORIZED ACCESS !
!
line con 0
password 7 0822455D0A16
logging synchronous
login
transport input none
stopbits 1
line vty 0 4
password 7 0822455D0A16
logging synchronous
login
line vty 5 15
password 7 0822455D0A16
logging synchronous
login
!
end
WIRELESS ROUTER Images
Screenshots from the Wireless Router follow:Click here for the Network Diagram
In addition to the diagram do the following.
- Configure the Management vlan to be anything other than vlan 1.
- Configure Spanning-tree portfast wherever advisable.
- Configure SW1 so you can remotely access it via SSH, and only SSH (remotely) to it. Be sure the switch has the IOS to do SSH.
- Configure SW2 so you can remotely access it via telnet.
- Be sure your VTP is secure.
- Enable VTP “pruning.”
- Be sure to name vlan5, vlan 7, and vlan9.
- Implement port/switch security. Include the following: 1) maximum number of MAC addresses per port, 2) static mapping of MAC to port number, 3) shutting down unused ports, 4) action taken when there is a port security breach, etc…
- Although in a production network the wireless part of your network would/should take much stronger security measures, all you need to do for this exercise is to:
- assign an SSID
- a 104/128 bit WEP key
- disable SSID broadcasting (beaconing)
- enable MAC filtering
When you are done and everything can ping, save the following output from the appropriate devices.
- show ip route
- show running-config
- show vlan brief
- show vtp status
- if necessary, screen shots from the AP (WRT300N).
- screen shots from PC connected wirelessly and pings to all locations
- whatever other commands you think appropriate.