Question
Port Security Configuration & Troubleshooting Scenario / Background For this activity, you are required to implement the L2 mitigation techniques you acquired from the module.
Port Security Configuration & Troubleshooting Scenario / Background For this activity, you are required to implement the L2 mitigation techniques you acquired from the module. The checking will be based on the rubrics presented below. Read, analyze and understand the requirements carefully. DHCP router and VLANs are already preconfigured. You just have to configure the device mentioned in the requirements. You can also document the network to help you familiarize the network topology. It's all up to you now how you're going to configure it as the Network Admin. Requirements + Rubrics Disable negotiation on all trunk ports. Shutdown all unused ports. Configure Port Security (static MAC, sticky, max 1, violation shutdown) on S1 and S2. Configure DHCP snooping (enable globally, enable on VLANs, identify where to set trusted port, rate limit set to 10 to untrusted ports on S1 and S2. Initially, DHCP service is working. But after configuring DHCP snooping, edge PCs will be unable to acquire IPs. For the edge PCs to acquire IP addresses, you also have to trust the switchports as to where the Edge PCs are connected. It's okay for now since there's already a MAC address statically configured using port security. Enable portfast on all switchports of S1 and S2. And enable bpduguard on switchports as to where edge PCs are connected. Lastly, edge PCs must be able to open cisco.com.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started