uired switch on their network. They want you to restrict access on the switch only to authorised devices. Below is the start-up network overview: A hub (Hub-PT Hub0) is placed in the director’s office and connected to the switch (2960-24TT Switch 0). Another hub (Hub-PT Hub1) is placed in the developers’ lab and it is connected to the switch (2960-24TT Switch 0) as well. The switch Switch0 enables hosts on the network to access data on the server Server0. 3.1 Create this network on packet tracer using the informati

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Switch ports security is a serious security concern to computer networks. As a network specialist
consultant, you have been approached by a start-up company to implement some port security
configurations on the newly acquired switch on their network. They want you to restrict access on
the switch only to authorised devices. Below is the start-up network overview:
A hub (Hub-PT Hub0) is placed in the director’s office and connected to the switch (2960-24TT
Switch 0). Another hub (Hub-PT Hub1) is placed in the developers’ lab and it is connected to
the switch (2960-24TT Switch 0) as well. The switch Switch0 enables hosts on the network
to access data on the server Server0.
3.1 Create this network on packet tracer using the information below.
• Connect a Laptop (Laptop0) Fa0 to Hub0 Fa0; then connect Hub0 Fa3 to the Switch0
Fa0/1.
• Connect a PC (PC0) Fa0 to Hub1 Fa0;
• Connect a PC (PC1) Fa0 to Hub1 Fa1;
• Connect a PC (PC2) Fa0 to Hub1 Fa2;
• Connect Hub1 Fa3 to Switch0 Fa0/2.
• Connect Switch0 Fa3 to Server0 Fa0
Then, configure the end devices with the following static IP addresses:
• Laptop0 (192.168.60.2 255.255.255.0),
• PC0 (192.168.60.3 255.255.255.0),
• PC1 (192.168.60.4 255.255.255.0) and
• PC2 (192.168.60.5 255.255.255.0)
• Server0 (192.168.60.100 255.255.255.0)
3.2 Configuration of Switch0 Fa0/1 port:
a. Enable port security on Switch0 Fa0/1 port.
b. Configure Switch0 Fa0/1 port to dynamically learn the MAC address of the end
device that is currently connected to it.
c. Enable (define) the Switch0 to be able to learn a maximum of 1 host on its Fa0/1
port.
d. If an unauthorised device attempts to send frames on the network through Switch0
Fa0/1, configure the switch to automatically shut down the port.
e. Show a summary of the commands used to achieve the above configurations.
3.3 Configuration of Switch0 Fa0/2 port:
a. Enable port security on Switch0 Fa0/2 port.
b. Configure Switch0 Fa0/2 port to dynamically learn the MAC addresses of the end
devices that are currently connected to it.
c. Enable (define) the Switch0 to be able to learn a maximum of 3 hosts on its Fa0/2
port.
d. If an unauthorised device attempts to send frames on the network through Switch0
Fa0/2, configure the switch to put port in a restricted mode.
e. Show a summary of the commands used to achieve the above configurations.
3.4 Display the contents of the MAC address-table. Take a screenshot of the output and
include in your assignment report. Comment on the obtained output. 
3.5 Successively from Laptop0, PC0, PC1 and PC2 ping the server Server0. Then, display
the contents of the MAC address-table. Take a screenshot of output and include in your
assignment report. Comment on the obtained result. 
3.6 Display the port security configuration statuses of interfaces Fa0/1 and Fa0/2 and Fa0/3.

3.7 Add a new Laptop, Laptop1, (192.168.60.7 255.255.255.0) to the network.
Connect its Fa0 port to Hub0’s Fa1 port. From this laptop ping the server, Server0.
Comment on your output and then discuss the status of the Switch port F0/1.

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Network Protocols
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education