OpenDNS ROUGE 1 PC1 0001.C930.5C5C Edge Hubo PC2 0003.E418.B94B Modemternet CoreSW PC3 000D.BD96.EC38 Admin Printer0 0001.42D1.5A4B Access Point Charles Alice Bob
https://drive.google.com/drive/folders/1gs_S8xqJ5RhXtcIOarCIowb8lR5dsDf_?usp=sharing
THIS IS MY GOOGLE DRIVE
Port Security Configuration & Troubleshooting
Scenario / Background
Company ABC is currently implementing port security on its Core Switch to protect its network from unauthorized access of its network. After configuring port security on WLAN, it was found out that one port of the Core Switch went down which affected the connectivity on the WLAN segment. As the network engineer of Company ABC, you are to identify which laptop caused issue, remove it from the wireless network and re-enable the port. Further, to avoid the issue going forward, you are also tasked to allow the 3 PCs ONLY on the LAN segments to connect to the network. and to shutdown all unused ports on the Core Switch.
The CoreSW have been preconfigured with the following:
- Admin username and password: admin/cisco
- Enable password: class
- Use SSH to access the CoreSW from the Admin Laptop. Open command prompt, type 'ssh -l '
- CoreSW IP add: 172.16.10.2
Requirements
- Configure Port Security on the CoreSW for the LAN segment.
- Allow the 3 PCs connected to the switch statically.
- Enable sticky feature.
- The violation should enable the user to view the logs from the OpenDNS server.
- Troubleshoot the port security issue on WLAN segment.
- All host must be able to access opendns.com. OpenDNS IP and DNS IP: 172.17.10.10
Step by step
Solved in 2 steps