Case Study 2 Voice and Security in a Switched Network

4
Arbab Nazar Case Study 2 Voice and Security in a Switched Network Disable the links between the access layer switches. DS1(config)#interface range fa 0/7 - 10 DS1(config-if-range)#sh DS2(config)#interface range fa 0/7 - 10 DS2(config-if-range)#sh AS1(config)#interface range fa 0/7 - 10 AS1(config-if-range)#sh AS2(config)#interface range fa 0/7 - 10 AS2(config-if-range)#sh Place all switches in the VTP domain CISCO and set them all to VTP mode transparent. DS1(config)#vtp domain CISCO DS1(config)#vtp mode transparent DS2(config)#vtp domain CISCO DS2(config)#vtp mode transparent AS1(config)#vtp domain CISCO AS1(config)#vtp mode transparent AS2(config)#vtp domain CISCO

Transcript of Case Study 2 Voice and Security in a Switched Network

Page 1: Case Study 2 Voice and Security in a Switched Network

Arbab Nazar

Case Study 2 Voice and Security in a Switched Network

Disable the links between the access layer switches.

DS1(config)#interface range fa 0/7 - 10DS1(config-if-range)#sh

DS2(config)#interface range fa 0/7 - 10DS2(config-if-range)#sh

AS1(config)#interface range fa 0/7 - 10AS1(config-if-range)#sh

AS2(config)#interface range fa 0/7 - 10AS2(config-if-range)#sh

Place all switches in the VTP domain CISCO and set them all to VTP modetransparent.

DS1(config)#vtp domain CISCODS1(config)#vtp mode transparent

DS2(config)#vtp domain CISCODS2(config)#vtp mode transparent

AS1(config)#vtp domain CISCOAS1(config)#vtp mode transparent

AS2(config)#vtp domain CISCO

Page 2: Case Study 2 Voice and Security in a Switched Network

Arbab Nazar

AS2(config)#vtp mode transparent

Make sure that all inter-switch links are statically set as 802.1q links.

Check it by SHOW RUN command; otherwise configure it by using thecommands provided in case study 1 Create VLANs 10 and 200 on all switche s. Give DLS1 and DLS2 SVIs in VLAN

10 and assign addresses in the 172.16.10.0/24 subnet.

DS1(config)#vlan 10DS1(config-vlan)#exitDS1(config)#vlan 200DS1(config-vlan)#exit

DS1(config)#interface vlan 10DS1(config-if)#ip add 172.16.10.1 255.255.255.0DS1(config-if)#no shDS1(config-if)#exit

DS2(config)#vlan 10DS2(config-vlan)#exitDS2(config)#vlan 200DS2(config-vlan)#exit

DS2(config)#interface vlan 10DS2(config-if)#ip add 172.16.10.2 255.255.255.0DS2(config-if)#no shDS2(config-if)#exit

AS1(config)#vlan 10AS1(config-vlan)#exitAS1(config)#vlan 200AS1(config-vlan)#exit

AS2(config)#vlan 10AS2(config-vlan)#exitAS2(config)#vlan 200AS2(config-vlan)#exit

Configure DLS1 and DLS2 to use HSRP on the 172.16.10.0/24 subnet. MakeDLS1 the primary gateway, and enable preemption on both switches.

DS1(config)#interface vlan 10DS1(config-if)#standby 10 ip 172.16.10.3

Page 3: Case Study 2 Voice and Security in a Switched Network

Arbab Nazar

DS1(config-if)#standby 10 priority 150DS1(config-if)#standby 10 preempt

DS2(config)#interface vlan 10DS2(config-if)# standby 10 ip 172.16.10.3DS2(config-if)# standby 10 preempt

Place ports Fa0/15 through Fa0/20 in VLAN 10 on both access layer switches.

AS1(config)#interface range fa 0/15 - 20AS1(config-if-range)#switchport mode accessAS1(config-if-range)#switchport access vlan 10AS1(config-if-range)#no shAS1(config-if-range)#exit

AS2(config)#interface range fa 0/15 - 20AS2(config-if-range)#switchport mode accessAS2(config-if-range)#switchport access vlan 10AS2(config-if-range)#no shAS2(config-if-range)#exit

Enable PortFast on all access ports.

AS1(config)#spanning-tree portfast default

AS2(config)#spanning-tree portfast default

DS1(config)#spanning-tree portfast default

DS2(config)#spanning-tree portfast default

Enable QoS on all switches involved in the scenario.

AS1(config)#mls qos

AS2(config)#mls qos

DS1(config)#mls qos

DS2(config)#mls qos

Page 4: Case Study 2 Voice and Security in a Switched Network

Arbab Nazar

Configure ALS1 F0/15 and F0/16 for using Cisco IP phones with a voice VLAN of200 and trust the IP phone CoSe s.

AS1(config)#interface range fa0/15 -16AS1(config-if-range)#switchport voice vlan 200AS1(config-if-range)#auto qos voip cisco-phoneAS1(config-if-range)#exit

DS1(config)#interface range fa0/7 - 8DS1(config-if-range)#auto qos voip trustDS1(config-if-range)#exit

DS2(config)#interface range fa 0/9 -10DS2(config-if-range)#auto qos voip trustDS2(config-if-range)#exit

Configure ALS1 F0/18 through F0/20 for port security. Allow only up to threeMAC addresses to be learned on each port and then drop any traffic from otherMAC addresses.

AS1(config)#interface range fa0/18 - 20AS1(config-if-range)#switchport port-securityAS1(config-if-range)#switchport port-security maximum 3AS1(config-if-range)#switchport port-security mac-address stickyAS1(config-if-range)#switchport port-security violation restrictAS1(config-if-range)#exit

Configure ALS2 F0/18 to only allows the MAC address 1234.1234 .1234 and toshut down if a violation occurs.

AS2(config)#int fa0/18AS2(config-if)#switchport port-securityAS2(config-if)#switchport port-security maximum 1AS2(config-if)#switchport port-security mac-address 1234.1234.1234AS2(config-if)#switchport port-security violation shutdownAS2(config-if)#exit