Practica eSwitching

ESwitching Basic Switching/Wireless PT Practice SBA

A few things to keep in mind while completing this activity:
1. Do not use the browser Back button or close or reload any exam windows during the exam.
2. Do not close Packet Tracer when you are done. It will close automatically.
3. Click the Submit Assessment button to submit your work.
In this practice Packet Tracer Skills Exam, you will:

configure VLANs using VTP
 configure inter-VLAN routing
 modify STP
 configure port security
 add a wireless LAN
Addressing Table



Subnet Mask

Default Gateway


























DHCP assigned



Note: The password for user EXEC mode is cisco. The password for privileged EXEC mode is class.
Step 1: Configure the Switches for Remote Access.
Create, enable, and address VLAN43 as the management interface on all three switches. Use the values found in the
addressing table.

SW_DS1(conf)#interface vlan 43
SW_DS1(conf-if)# ip address
SW_DS1(conf-if)#no shutdown

Create and name the following VLANs on SW_DS1. Configure SW_DS1 as VTP server and the following VTP parameters: · SW_DS1 is the VTP server.16.16. tendremos que introducir estos comandos en los tres switches: (conf)#interface range fa0/19-24 (conf-if range)#switchport mode trunk (conf-if range)#switchport trunk native vlan 43 (conf-if range)#no shutdown (conf-if range)#end Step 3: Configure VTP and VLANs.43.12 255. · VLAN 10: Student · VLAN 20: Faculty · VLAN 43: Management · VLAN 67: Wireless SW_DS1# conf t SW_DS1(conf)# vlan 10 SW_DS1(conf-vlan)# name Student SW_DS1(conf-vlan)#end SW_DS1# conf t SW_DS1(conf)# vlan 20 SW_DS1(conf-vlan)# name Faculty SW_DS1(conf-vlan)#end . Para configurar el trunking.255.0 SW_AC2(conf-if)#no shutdown SW_AC3(conf)#interface vlan 43 SW_AC3(conf-if)# ip address 172.  Assign VLAN 43 as the native VLAN. For interfaces FastEthernet 0/19 through FastEthernet 0/24 on all three switches:  Configure static trunking. Note: Packet Tracer now supports the use of the range argument for the interface command.255. · VTP domain name: CCNA · VTP password: cisco SW_DS1(conf)#vtp mode server SW_DS1(conf-if)#vtp domain CCNA SW_DS1(conf-if)#vtp password cisco SW_DS1(conf-if)#end b.43. a.SW_AC2(conf)#interface vlan 43 SW_AC2(conf-if)# ip address SW_AC3(conf-if)#no shutdown Ademas añadiremos en la configuración global la puerta de enlace con el siguiente comando: (conf)# ip default-gateway 172.1 Step 2: Configure Trunking.

Tendremos que introducir los siguientes comandos en los switches: (conf)# interface range fa0/1-10 (conf-if-range)# switchport mode access (conf-if-range)# switchport access vlan 10 (conf-if-range)# end (conf)# interface range fa0/11-17 (conf-if-range)# switchport mode access (conf-if-range)# switchport access vlan 20 (conf-if-range)# end Y este comando solo para el switch SW_AC3: (conf)# interface FA0/18 (conf-if-range)# switchport mode access (conf-if-range)# switchport access vlan 67 (conf-if-range)# end . SW_AC3 Fa0/1 – 0/10 10 SW_AC2. SW_AC3 Fa0/11 – 0/17 20 SW_AC3 Fa0/18 67 Configure access ports on access layer switches. Verify that VTP is operational. · Assign VLANs according to the port assignments table. Device Ports Assignment SW_AC2. En este paso tendremos que poner los dos switches restantes. Configure SW_AC2 and SW_AC3 as VTP clients to participate in the CCNA VTP domain. · Configure the appropriate interfaces on SW_AC2 and SW_AC3 for access mode.SW_DS1# conf t SW_DS1(conf)# vlan 43 SW_DS1(conf-vlan)# name Management SW_DS1(conf-vlan)#end SW_DS1# conf t SW_DS1(conf)# vlan 67 SW_DS1(conf-vlan)# name Wireless SW_DS1(conf-vlan)#end c. sh vtp status Step 4: Configure Interfaces for VLAN Access VLAN port assignments on each switch are as follows: a. de la siguiente manera: (conf)#vtp mode client (conf-if)#vtp domain CCNA (conf-if)#vtp password cisco (conf-if)#end d.

43 Router1(config-if)#encapsulation dot1q 43 native Router1(config-if)#ip address 172.0 Router1(config-if)#no shutdown Router1(config-if)#interface fa0/0. Step 5: Configure Spanning Tree.255. Router1(config)#interface fa0/0 Router1(config-if)#no shutdown Router1(config-if)#interface fa0/0.255. However. SW_DS2# conf t SW_DS2(conf)#spanning-tree vlan 10 priority 8192 SW_DS2(conf)#spanning-tree vlan 20 priority 8192 SW_DS2(conf)#spanning-tree vlan 43 priority 8192 SW_DS2(conf)#spanning-tree vlan 67 priority 8192 b.16. Note: Best practice requires port security on all access ports.255.20 Router1(config-if)#encapsulation dot1q 20 Router1(config-if)#ip address 172. a.  Use the information in the Addressing Table to configure Router1 for inter-VLAN routing. · Modify STP root bridge elections.1 255. · Once learned.16.16. set SW_AC2 so that it will become the root for all VLANs if SW_DS1 fails.67 Router1(config-if)#encapsulation dot1q 67 Router1(config-if)#ip address 172. a.255.255.255. Configure SW_AC3 with port security on FastEthernet 0/2.0 Router1(config-if)#no shutdown Step 7: Configure Port Security.16. · Enable port security.  Verify inter-VLAN routing. · No more than two MAC addresses are allowed on the FastEthernet 0/2 port for SW_AC3.0 Router1(config-if)#no shutdown Router1(config-if)#interface fa0/0.255. .43.b. Verify trunking and VLAN assignments.20.1 255.67. Step 6: Configure Inter-VLAN Routing.255.10 Router1(config-if)#encapsulation dot1q 10 Router1(config-if)#ip address 172.0 Router1(config-if)#no shutdown Router1(config-if)#interface fa0/0. set SW_DS1 as the root bridge for all VLANs. Be sure to designate the native VLAN. for this practice exercise you will only configure one port with security.10. Verify the spanning tree election. MAC addresses should be automatically added to the running configuration. Using a priority of 4096.1 255. SW_DS1# conf t SW_DS1(conf)#spanning-tree vlan 10 priority 4096 SW_DS1(conf)#spanning-tree vlan 20 priority 4096 SW_DS1(conf)#spanning-tree vlan 43 priority 4096 SW_DS1(conf)#spanning-tree vlan 67 priority 4096 · Using a priority of 8192.1 255.

PC1 can ping PC2. Configure PC4 to access the wireless network that is provided by WRS. · The starting IP address in the wireless LAN subnet is 172. Note: It will not be possible for devices to ping PC4 since PC4 is behind the WRS NAT firewall. d.10. Although these are not scored.100. PC4 can ping PC1. · The maximum number of users is 25. Step 9: Verify Connectivity. · Set the router IP and subnet mask. · Enable WEP security and use 12345ABCDE as key1. the port should be automatically disabled. b. · Use the DHCP Server Settings to configure the router to provide wireless hosts with an IP address.16. · Use static addressing on the Internet interface. SW_AC2 can ping Router1. Use cisco123 as the remote management password.       SW_DS1 can ping Router1. a. PC2 can ping PC3. . SW_AC3#conf t SW_AC3(config)#interface fastethernet 0/2 SW_AC3(config-if)#switchport mode access SW_AC3(config-if)#switchport security maximun 2 SW_AC3(config-if)#switchport security mac_address sticky SW_AC3(config-if)#switchport security violation protect Step 8: Configure the Wireless LAN. Configure WRS. b. c. Configure wireless security. Verify that port security is implemented. Refer to the Addressing Table to configure the wireless LAN.· If this policy is violated. · Set the SSID to WRS_LAN. the following connectivity tests should be successful. PC4 uses DHCP to obtain addressing information. SW_AC3 can ping Router1.