NETW 204 week 2- Lab Report- Configuring VLANs and Trunks and Configure and.docx

30 July, 2024 | 6 Min Read

Lab Title Configuring VLANs and Trunks and Configure and

Verify Switch Port Security Features

Your Name:

DSI Number:

NETW204

DeVry University

Date: 11/8/15

Professor Name: Yahya Jeff Daoud

Introduction

Discuss what you will do in this lab. Provide some background information on the main idea in this lab and discuss the purpose of the lab activity. The purpose of the lab was to configure a new VLAN. Also to configure trunking between switches using different methods. We also learned how to construct restricted access to certain VLANS.

Procedure

How did you go about implementing the lab activity. Describe the steps you took to ensure that the final implementation meets the original business goal. For example, did you design a new IP scheme and assign IP addresses to devices based on a given range of IP addresses? Did you assign IP addresses manually, dynamically, or both? Did you name devices based on location? Did you or would you connect switches first or routers first, why? Did you configure the end devices or the infrastructure devices first? What was the plan to verify that the network work?

Note that the procedure must take into consideration not only the steps you took to implement the lab solution but also the order in which you carried out those steps and a rationale for doing so.

I performed the tasks that were presented before me.

The first part of the lab we were to configure and verify VLANS, we were assigned to connet to NYCORE1 which when booted up we input the NYCORE1#show vlan command that gave us a list of the VLAN name,status, and ports provided. Then we input NYCORE1# configure terminal which then put NYCORE1(config)#vlan 5 followed by NYCORE1(config-vlan)#name engineering, after putting these commands in we exited privileged mode. By putting the command NYCORE1#show vlan brief showed that the VLAN that we have created was active and up and running.

The second part of the lab which was to congfigure and verify trunking, the inputs we put into this lab were NYCORE1#show cdp neighbors which gave us a list of devices conneted to the switch. The next command NYCORE1#configure terminal,NYCORE1(config)#interface fastethernet 1/0/24, NYCORE1(config-if)#switchport mode trunk, Command rejected: An interface whose trunk encapsulation is “Auto” can not be, configured to “trunk” mode.

The second lab was configure and verify switch port security features, the first step of this was inputing the command NYCORE2# show ip interface brief and this shows the IP interfaces current states they are in. The second step we were to disable all the interfaces that were in a down-down state, by doing this we could put the command NYCORE2#show ip interface brief which gave results of showing that the interfaces status was administratively down. This lab is mainly these three points,configure all secure MAC addresses by using the switchport portsecurity mac-address mac_address interface configuration command, allow the port to dynamically configure secure MAC addresses with the MAC addresses of connected devices, and configure a number of addresses and allow the rest to be dynamically configured.

Results

Discuss your findings here. You devise some steps to complete the lab. Did the lab work? Did you make adjustments to your original procedure? How can you tell that the lab activity implemented meets the business needs? Yes the lab worked, I was able to create a configure a VLAN, including naming it. Also how to configure trunking between switches using a number of different modes given, which allowed for restricted access to certian VLANS on my trunk. Another thing is when configuring a number of VLANS which helps secure your network and using the port security interface to ensure for secure connection.

Application and Analysis

Below are some sample questions that will guide you as you complete this lab section.

From the information given, can you develop a set of instructions to implement the solution in a

small-to medium-sized network? yes

What, if anything, would you change before applying the lab activity in a production (live) network? I would keep running tests to see if the settings given will ensure a secure network.

What vertical market (Financial, Manufacturing, Education, Healthcare, Telecommunications, etc.) does this lab activity align with the most? Why? This would align with all of the vertical markets because its configuring VLANS and Tunks, also verifying switch ports security features which is major demand in setuping up a network to ensure in secure.

How was this lab activity similar to other labs that you have done in the past? I have not done any other lab that relates to this in the past.

Can you distinguish between concepts and application? yes because concepts are the diagram of the task being performed and application is doing the tasks on your own.

Questions

1. What new concepts or theories have you learned about after completing this lab activity? How to configure a new VLAN and Trunking between switches and how to implement security within the ports.

2. In this class, we use the three steps approach to complete the lab activity. The steps include plan, implement, and verify. Discuss and explain how you execute each step in this lab activity. I implement thise steps by doing them one by one to make sure that everything is correct and setup right.

3. What challenges, if any, have you encountered in this lab? How have you addressed those challenges? If you have not experienced any challenge, tell us what new troubleshooting commands you have learned this week and how that command has helped you complete the lab activity. There was no challenge in this weeks lab on getting it up and running.

4. How would you apply what you have learned this week in future courses or in the IS/IT field? I can apply what I learned in this lab to configure a new switch. If I was an IT technician I would be able to install and service network devices provided for small companies. I do think I need more practice at writing instructions pertaining to configuring routers and switches.

Conclusion and Recommendation

In the conclusion, you need to address what you intended to do and correlate that with what you actually did. Did the two differ in any way? Please explain any difference between expectation and observation. The 2 labs worked together by setting up your own VLAN and also learning how to implement port security which ensures you that your network is up and running secure.

What would you suggest that we do differently to improve the lab experience? If you do not have any suggestions for this week, then what do you wish we add or remove from this week’s lab to enhance your overall learning experience? Dont have any suggestions because Im learning all of this for the firs time.

How did the lab activity align with today’s technology? By leanring how to create and setup VLAN,Trunking of a network and the configureation of port secutiry within a switch allows for knowing how to setup and secure a network properly.

Lessons Learned

This is the take-away message. What have you learned from this lab activity? Assume this question comes from your grandma, what would you tell her? She does not need to have a technical background to understand what you did. In brief, make it plain and simple? I would explain to her that I was setting up a secure connection on a networking and would draw her a diagram of how all of the things we learned in this lab tie together to ensure security for major network.

References

Please provide any external references used to complete this lab assignment.

http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/configuration/guide

/cli/CLIConfigurationGuide/AccessTrunk.html

http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/122/25ew/configuration/guide/conf/port_sec.html

Powered by TCPDF (www.tcpdf.org)

Related posts