Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Part 1. Configuring FTP Server in Packet Tracer The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer

image text in transcribedimage text in transcribedimage text in transcribed

Part 1. Configuring FTP Server in Packet Tracer The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network. 1. Build the network topology. Addressing Table: Device FTP Server CBA CCMS CENG CBA FTP Server CENG CCMS Interface IP Address Subnet Mask NIC 192.168.1.1 /24 NIC 192.168.1.2 /24 NIC 192.168.1.3 /24 NIC 192.168.1.4 /24 2. As default FTP Services is enable in Packet Tracer. But to make sure: a. Double click the server b. Go to Services PFTP Server . Physical De Abus SERVICES HTTP FIP Service DHCPv6 User Sexp ONS SYSLOG Top *Default Username and Password is cisco EMA 3 T Radus CMP Read Preced P Ad WON 25- in 3 c1841-advipered-me 134-15T1 3. Create a file in the PC (CBA, CCMS and CENG). To do this: a. In the PC, open Text Editor b. Create a file. c. Save your file as CBA.txt for CBA, CCMS.txt for CCMS and CENG.txt for CENG. 4. Upload the files from the 3 PC to the FTP server. a. ftp b. put *To check other FTP commands supported by the FTP client running on the Laptop(or PC), you can use a question mark (?) on the command prompt. 5. Once file upload is successful, go to FTP Server-Services-FTP and check your file. Part 2. Configuring Port Security Step 1: Configure Port Security a) Access the command line for Switch and enable port security on ports where CBA, CCMS and CENG connected. S1(config)# interface range f0/1-2 S1(config-if-range)# switchport port-security b) Set the maximum so that only one device can access the ports. S1(config-if-range)# switchport port-security maximum 1 c) Secure the ports so that the MAC address of a device is dynamically learned and added to the running configuration. S1(config-if-range)# switchport port-security mac-address sticky d) Set the violation mode so that the ports are not disabled when a violation occurs, but a notification of the security violation is generated and packets from the unknown source are dropped. S1(config-if-range)# switchport port-security violation restrict e) Disable all the remaining unused ports. Use the range keyword to apply this configuration to all the ports simultaneously. S1(config-if-range)# interface range f0/3-24, 90/1 - 2 S1(config-if-range)# shutdown Step 2: Verify Port Security a) Verify that port security is enabled and the MAC address of PC from CBA, CENG and CETD were added to the running configuration. S1# show run begin interface b) Use port-security show commands to display configuration information S1# show port-security S1# show port-security address c) Attach Rogue Laptop to any unused switch port and notice that the link lights are red d) Enable the port and verify that Rogue Laptop can ping all the PC. After verification, shutdown the port connected to Rogue laptop. e) Disconnect CBA pc and connect Rogue Laptop to the same port as CBA originally connected. Verify that Rogue Laptop is unable to ping other PC. f) Display the port security violations for the port to which Rogue Laptop is connected. S1# show port-security interface f0/2 How many violations have occurred? g) Disconnect Rouge Laptop and reconnect CBA pc. Verify CBA can ping CETD and CCMS Why is CBA able to ping other PC, but the Rogue laptop is not?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Computer Networks

Authors: Andrew S. Tanenbaum, David J. Wetherall

5th edition

132126958, 978-0132126953

More Books

Students also viewed these Computer Network questions

Question

How are writable CDs implemented?

Answered: 1 week ago

Question

=+a) What kind of design or study is this?

Answered: 1 week ago

Question

The instruction that uses psuedo - direct addressing mode is

Answered: 1 week ago

Question

Defi ne HR planning and outline the HR planning process. LO1

Answered: 1 week ago