Lab 11 : Configuring Switch Security Features

Topology

Objectives

  • Configure and Verify SSH Access on ESW1

    • Configure SSH access

    • Modify SSH parameters

    • Verify the SSH configuration

  • Configure and Verify Security Features on ESW1

    • Configure and verify general security features

    • Configure and verify port security

Task 1

  • Configure an IP address on PC-1

Task 2

  • Configure interface IP address as shown in the topology.

  • Assign class as the privileged EXEC mode password.

  • Assign cisco as the console and vty password and enable login.

  • Encrypt plain text passwords.

  • Save the running configuration to startup configuration.

Task 3

  • Configure SSH access on ESW1.

    • Enable SSH on ESW1. Create a domain name of KELASPAR.

    • Create a local user database entry for use when connecting to the switch via SSH. The user should have administrative level access.

    • Configure the transport input for the vty lines to allow SSH connections only.

    • Generate an RSA crypto key using a modulus of 1024 bits.

Task 4

  • Verify the SSH configuration and answer the questions below.

  • Question 1: What version of SSH is the switch using?

1.99

  • Question 2: How many authentication attempts does SSH allow?

3

Task 5

  • Create VLAN 99 on the switch and name it Management.

Task 6

  • Configure the VLAN 99 management interface IP address and enable the interface.

Task 7

  • Issue the show vlan command on ESW1.

Task 8

  • Issue the show ip interface brief command on ESW1.

  • Question 1: What is the status and protocol for management interface VLAN 99?

Status is up, and protocol is down.

  • Question 2: Why is the protocol down, even though you issued the no shutdown command for interface VLAN 99?

No physical ports on the switch have been assigned to VLAN 99.

Task 9

  • Assign ports F0/0 and F0/1 to VLAN 99 on the switch.

Last updated