Lab 7.5.2: Challenge Wireless Configuration: Topology Diagram
Lab 7.5.2: Challenge Wireless Configuration: Topology Diagram
Lab 7.5.2: Challenge Wireless Configuration: Topology Diagram
Addressing Table
Default Gateway Device Interface Fa0/1.10 R1 Fa0/1.20 Fa0/1.88 Lo0 WRS2 WAN LAN/Wireless WAN LAN/Wireless NIC IP Address 172.17.10.1 172.17.20.1 172.17.88.1 10.1.1.1 172.17.88.25 172.17.40.1 172.17.88.35 172.17.30.1 172.17.10.21 Subnet Mask 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.252 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 N/A N/A N/A N/A 172.17.88.1 N/A 172.17.88.1 N/A 172.17.10.1
WRS3 PC1
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
PC2
NIC
172.17.20.22
255.255.255.0
172.17.20.1
Learning Objectives
Upon completion of this lab, you will be able to: Configure switch port VLAN information and port security Hard reset a Linksys WRT300N router Connect and verify connectivity to a wireless router Navigate to a Linksys WRT300Ns web utility page Configure the IP settings of a Linksys WRT300N Configure DHCP on a Linksys WRT300N Configure static routes on both standard Cisco routers and on a WRT300N Change the network mode and corresponding network channel on a WRT300N Learn how to enable WEP encryption and disable SSID broadcast Enable a wireless MAC filter Configure access restrictions on a WRT300N Configure router management password on a WRT300N Enable logging on a WRT300N Upgrade WRT300N firmware Learn diagnosis, backup, restore, and confirmation mechanisms on a WRT300N
Scenario
In this lab, you will configure a Linksys WRT300N, port security on a Cisco switch, and static routes on multiple devices. Make note of the procedures involved in connecting to a wireless network because some changes involve disconnecting clients, which may then have to reconnect after making changes to the configuration.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
vlan 10,20,88 ! Step 1: Configure switch port interfaces on S1, S2, and S3. Configure the interfaces on the S1, S2, and S3 switches with the connections from topology diagram. On connections between two switches configure trunks. On connections to a wireless router configure them as access mode for vlan 88. Configure S2s connection to PC1 in vlan 10 and PC2s connection in vlan 20. Configure S1s connection to R1 as a trunk. Allow all VLANS across trunking interfaces. S1 ! interface FastEthernet 0/1 switchport trunk encapsulation switchport mode trunk no shutdown ! interface FastEthernet 0/2 switchport trunk encapsulation switchport mode trunk no shutdown ! interface FastEthernet 0/3 switchport trunk encapsulation switchport mode trunk no shutdown ! interface FastEthernet 0/4 switchport trunk encapsulation switchport mode trunk no shutdown ! interface FastEthernet0/5 switchport trunk encapsulation switchport mode trunk no shutdown !
dot1q
dot1q
dot1q
dot1q
dot1q
S2 ! interface FastEthernet 0/1 switchport trunk encapsulation dot1q switchport mode trunk no shutdown ! interface FastEthernet 0/2 switchport trunk encapsulation dot1q switchport mode trunk no shutdown ! interface FastEthernet 0/3
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
switchport trunk encapsulation dot1q switchport mode trunk no shutdown ! interface FastEthernet 0/4 switchport trunk encapsulation dot1q switchport mode trunk no shutdown ! interface FastEthernet0/7 switchport mode access switchport access vlan 88 no shutdown ! S3 ! interface FastEthernet 0/1 switchport trunk encapsulation switchport mode trunk no shutdown ! interface FastEthernet 0/2 switchport trunk encapsulation switchport mode trunk no shutdown ! interface FastEthernet 0/3 switchport trunk encapsulation switchport mode trunk no shutdown ! interface FastEthernet 0/4 switchport trunk encapsulation switchport mode trunk no shutdwn ! interface FastEthernet 0/7 switchport mode access switchport access vlan 88 no shutdown ! interface FastEthernet 0/11 switchport mode access switchport access vlan 11 no shutdown ! interface FastEthernet 0/18 switchport mode access switchport access vlan 20 no shutdown ! Step 2: Verify VLANs and trunking.
dot1q
dot1q
dot1q
dot1q
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 4 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
Use the show ip interface trunk command on S1 and the show vlan command on S2 to verify that the switches are trunking correctly and the proper VLANs exist. S1#show interface trunk Port Fa0/1 Fa0/2 Fa0/3 Fa0/4 Fa0/5 Port Fa0/1 Fa0/2 Fa0/3 Fa0/4 Fa0/5 Port Fa0/1 Fa0/2 Fa0/3 Fa0/4 Fa0/5 Port Port Fa0/1 Fa0/2 Fa0/3 Fa0/4 Fa0/5 Mode on on on on on Encapsulation 802.1q 802.1q 802.1q 802.1q 802.1q Status trunking trunking trunking trunking trunking Native vlan 1 1 1 1 1
Vlans allowed on trunk 1-4094 1-4094 1-4094 1-4094 1-4094 Vlans allowed and active in management domain 1,10,20,88 1,10,20,88 1,10,20,88 1,10,20,88 1,10,20,88 Vlans in spanning tree forwarding state and not pruned Vlans in spanning tree forwarding state and not pruned 1,10,20,88 none -- blocked due to spanning tree 1,10,20,88 1,10,20,88 1,10,20,88>
S2#show vlan VLAN Name Status Ports ---- -------------------------------- --------- ----------------------------1 default active Fa0/5, Fa0/6, Fa0/8, Fa0/9 Fa0/10, Fa0/12, Fa0/13,Fa0/14 Fa0/15, Fa0/16, Fa0/17,Fa0/19 Fa0/20, Fa0/21, Fa0/22,Fa0/23 Fa0/24, Gi0/1, Gi0/2 10 VLAN0010 active Fa0/11 20 VLAN0020 active Fa0/18 88 VLAN0088 active Fa0/7 1002 fddi-default act/unsup 1003 token-ring-default act/unsup 1004 fddinet-default act/unsup 1005 trnet-default act/unsup When you have finished, be sure to save the running configuration to the NVRAM of the router and switches. Step 3: Configure the Ethernet interfaces of PC1 and PC2.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 5 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
Configure the Ethernet interfaces of PC1 and PC2 with the IP addresses and default gateways according to the addressing table at the beginning of the lab. Step 4: Test the PC configuration. Ping the default gateway from the PC: 172.17.10.1 for PC1, and 172.17.20.1 from PC2. Go to Start->Run->cmd and type ping 172.17.x.x
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 6 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 7 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
Step 2: Verify connectivity settings. Verify the connectivity settings by going to Start > Run and typing cmd. At the command prompt, type the command ipconfig to view your network device information. Notice which IP address is the default gateway. This is the default IP address of a Linksys WRT300N.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 8 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
Step 2: Enter authentication information. You are prompted for a username and password. Enter the WRT300N factory default password of admin and leave the username field blank.
You should now be viewing the default page of the Linksys WRT300N web utility.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 9 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 10 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 11 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
Step 2: Set the IP address settings for Internet Setup. Set the Internet IP address to 172.17.88.35. Set the subnet mask to 255.255.255.0. Set the default gateway to the Fa 0/1 VLAN 88 IP address of R1, 172.17.88.1.
Step 4: Save the settings. Click Save Settings. You are prompted with the following window. Click Continue. If you are not redirected to the new URL of the web utility (http://172.17.30.1), navigate your browser there as you did in Task 4, Step 1.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 12 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 13 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
Step 5: Verify IP address changes. Go back to the command prompt and notice the new IP addresses. Use the command ipconfig.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 14 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
This gives Pc6, the computer with a MAC address of 00:05:4E:49:64:F8, the same IP address, 172.17.30.100, whenever it requests an address through DHCP. This is only an example of a quick way to permanently bind a client to its current DHCP-given IP address. Now, you will assign Pc6 the IP address in the topology diagram, not the one it received initially. Click Remove to assign a new address.
Step 2: Assign Pc6 the 172.17.30.26 address. By entering the Pc6 address under Manually Adding Client, whenever Pc6 connects to the wireless router, it receives the IP address 172.17.30.26 via DHCP. Save your changes.
Step 3: Verify the static IP address change. Since we already have an IP address from DHCP we are not going to get the new address, 172.17.30.26, until we reconnect. We will wait and notice that later in Task 6, Step 5 and verify that this change has taken place. Step 4: Configure the DHCP server. Set the start address to 50, the maximum number of users to 25, and the lease time to 2 hours (or 120 minutes).
These settings give any PC that connects to this router wirelessly requesting an IP address through DHCP, an address between 172.17.30.5074. Only 25 clients at a time are able to get an IP address and can only have the IP address for two hours, after which time they must request a new one. Note: IP Address Range does not update until you click Save Settings.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 15 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
Step 5: Configure the router for the appropriate time zone. At the bottom of the Basic Setup page, change the time zone of the router to reflect your location.
Step 2: Configure other settings. Change the Network Name SSID to WRS3, Standard Channel to 6 2.437GHZ, and disable SSID Broadcast. Why is it good to change the wireless channel to be different from the default channel? ________________________________________________________________________________ ________________________________________________________________________________ Why is it recommended to disable SSID broadcast? ________________________________________________________________________________ ________________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 16 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
Step 3: Click Save Settings. Step 4: Verify that the SSID of the router is no longer being broadcast. Scan for wireless networks, as done in Task 3, Step 1. Does the SSID of the wireless router appear? _________________________ Step 5: Reconnect to the wireless network. Navigate to Start > Control Panel > Network Connections, right-click the Wireless Network Connection icon, and select Properties.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 17 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
In the Association Tab, enter WR33 as the SSID, and set the Data Encryption to Disabled. Select OK, and then select OK again. Windows should now try to reconnect to the wireless router.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 18 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
Step 6: Verify the settings. Now that you have reconnected to the network, you have the new DHCP settings that you configured in Task 5, Step 3. Verify this at the command prompt with the ipconfig command.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 19 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
Step 4: Enter a WEP key. A network is only as secure as its weakest point, and a wireless router is a very convenient place to start if someone wants to damage your network. By not broadcasting the SSID and requiring a WEP key to connect to the router, you are adding a few levels of security. Unfortunately, there are tools that can discover networks that are not even broadcasting their SSID, and there are even tools that can crack WEP key encryption. A more robust form of wireless security is WPA and WPA-2, which are currently not supported on this router. Wireless MAC filters is more secure but sometimes impractical means of securing your network. It is discussed in the next task. Add the WEP key 1234567890.
Step 5: Save your settings. You will become disconnected from the network. Step 6: Configure Windows to use WEP authentication. Navigate to the Network Connections page again and right-click the Wireless Network Connection icon. In the Wireless Networks tab, locate the WRS3 network, and click Properties. Set Data Encryption to WEP. Uncheck This Key Is Provided For Me. Enter the network key of 1234567890, as configured before on the router. Click OK and OK.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 20 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
This prevents any client with the MAC address 00:05:4E:49:64:87 from accessing the wireless network.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 21 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
Step 2: Click Wireless Client List. The Wireless Client List shows anyone currently connected to the router via a wireless connection. Also take note of the option Save to MAC filter list. Checking this option automatically adds the MAC address of that client to the list of MAC addresses to prevent or permit access to the wireless network. What is an extremely robust way of only allowing clients of your choosing to connect to the wireless network? ________________________________________________________________________________ ________________________________________________________________________________
Why does this become not feasible in large networks? ________________________________________________________________________________ ________________________________________________________________________________
What is a convenient way of adding MAC addresses if everyone to whom you wanted to allow access was already connected to the wireless network? ________________________________________________________________________________ ________________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 22 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
Step 2: Set the IP address range. Apply this configuration to anyone that is using a default DHCP address in the range of 172.17.30.50 74. Click the Edit List button at the top of the window and enter the IP address range. Save the settings.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 23 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
Task 11: Managing and Securing the Web Utility of the Router
Step 1: Configure web access. Navigate to the Administration section. Change the router password to cisco. For Web Utility Access, select both HTTP and HTTPS. Selecting HTTPS access allows a network administrator to manage the router via https://172.17.30.1 with SSL, a more secure form of HTTP. If you choose to do this in the lab, you may have to accept certificates.
For Web Utility Access via Wireless, select Enabled. If you disabled this option, the Web Utility would not be available to clients connected wirelessly. Disabling access is another form of security, because it requires the user to be directly connected to the router before changing settings. However, in this lab scenario, you are configuring the router via wireless access, so disabling access would not be a good idea! Now back up your configuration by clicking the Backup Configurations button. When prompted, save the file to your desktop.
Step 2: Restore your configuration. If your settings are accidentally or intentionally changed or erased, you can restore them from a working configuration using the Restore Configurations option located in the Backup and Restore section. Click the Restore Configuration button now. In the Restore Configurations window, browse to the previously saved configuration file. Click the Start to Restore button. Your previous settings should be successfully restored.
Step 3: Enable logging. Navigate to the Log tab and enable logging. You are now able to view the log of the router.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 24 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
Step 4: Save your settings and end your wireless connection to the router. Step 5: Plug an Ethernet cable into one of the wireless routers LAN ports and connect to it Step 6: Navigate to the routers Web GUI. Step 7: Navigate to the Administration section Step 8: Upgrade the firmware. Go to http://www.linksys.com/servlet/Satellite?c=L_CASupport_C2&childpagename=US%2FLayout&cid=11668 59841746&pagename=Linksys%2FCommon%2FVisitorWrapper&lid=4174637314B274&displaypage=do wnload Select your router version. Instructions for identifying the version are located on the Linksys website.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 25 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
Either click Firmware or the save icon. If prompted, save the file to the disk.
Before upgrading, notice the current firmware version in the upper right corner.
Navigate to the Administration section. Click Upgrade Firmware. Browse to the file you just downloaded. Click Start to Upgrade. The upgrade should not be interrupted, so make sure to not power off the device.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 26 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
Step 2: Disable NAT. In the Setup section, click the Advanced Routing tab. Disable NAT.
Step 3: Connect to WRS2. Set the IP address settings for Internet Setup. Set the Internet IP address to 172.17.88.25. Set the subnet mask to 255.255.255.0.
Set the default gateway to the Fa 0/1 VLAN 88 IP address of R1, 172.17.88.1 Configure the Network Setup IP address to 172.17.30.1 Statically bind the MAC address of PC3 to the DHCP address 172.17.40.23 (hint: Task 6, Step 2). Change the wireless SSID to WRS2 (hint: Task 7, Step 2).
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 27 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
Step 4: Give R1 static routes to the 172.17.30.0 and 172.17.40.0 networks. R1config)#ip route 172.17.30.0 255.255.255.0 172.17.88.35 R1(config)#ip route 172.17.40.0 255.255.255.0 172.17.88.25
Step 5: Repeat steps 1 and 2 above for WRS2. Step 6: Verify connectivity. Verify that R1 has routes to PC3 and PC6 and that it can successfully ping them. R1#sh ip route <output deleted> Gateway of last resort is not set 172.17.0.0/24 is subnetted, 5 subnets 172.17.40.0 [1/0] via 172.17.88.25 172.17.30.0 [1/0] via 172.17.88.35 172.17.20.0 is directly connected, FastEthernet0/1.20 172.17.10.0 is directly connected, FastEthernet0/1.10 172.17.88.0 is directly connected, FastEthernet0/1.88 10.0.0.0/24 is subnetted, 1 subnets 10.1.1.0 is directly connected, Loopback0
S S C C C C
R1#ping 172.17.30.26 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 172.17.30.26, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/4 ms
R1#ping 172.17.40.23 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 172.17.40.23, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms Verify that PC3 and PC6 can ping the loopback of R1. Verify that PC3 and PC6 can ping each other. Verify that PC3 and PC6 can ping PC1 and PC2.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 28 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 29 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
If WRS2 knew that it could get to the 172.17.30.0 network from 172.17.88.35 it would just directly send it to that IP address. So lets tell it!
Step 2: Configure a new route. In the Setup section, click the Advanced Routing tab. For Static Routing, enter the following settings: In the Route Name field, enter To WRS2 Clients. For Destination LAN IP, enter the network behind WRS2: 172.17.40.0 Enter a subnet mask of /24 Enter a gateway of 172.17.88.35 Set the interface to Internet (WAN)
Step 3: Verify the new route. In the Diagnostics tab in the Administration section, re-enter the IP address of PC3 in the Traceroute Test field. Click Start to Traceroute to see the route.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 30 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
Notice WRS2 goes straight to WRS3 and saves us the extra hop to R1! Do the same thing on WRS3 for the 172.17.40.0/24 network, pointing towards WRS2s WAN interface, 172.17.88.25.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 31 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
no shutdown ! Step 3: Generate traffic across the ports by pinging PC2 from PC1. Step 4: Verify port security. S1#show port-security address Secure Mac Address Table -----------------------------------------------------------------------Vlan Mac Address Type Ports Remaining Age (mins) --------------------------------10 0006.5b1e.33fa SecureSticky Fa0/11 20 0001.4ac2.22ca SecureSticky Fa0/18 -----------------------------------------------------------------------Total Addresses in System (excluding one mac per port) : 0 Max Addresses limit in System (excluding one mac per port) : 6272 S1#sh port-security int fa Port Security Port Status Violation Mode Aging Time Aging Type SecureStatic Address Aging Maximum MAC Addresses Total MAC Addresses Configured MAC Addresses Sticky MAC Addresses Last Source Address:Vlan Security Violation Count 0/11 : Enabled : Secure-up : Shutdown : 0 mins : Absolute : Disabled : 1 : 1 : 0 : 1 : 0006.5b1e.33fa:10 : 0
Appendix
Configurations
Hostname R1 ! enable secret class ! no ip domain lookup ! interface Loopback0 ip address 10.1.1.1 255.255.255.0 ! interface FastEthernet0/1 no shutdown ! interface FastEthernet0/1.10 encapsulation dot1Q 10 ip address 172.17.10.1 255.255.255.0 ! interface FastEthernet0/1.20 encapsulation dot1Q 20 ip address 172.17.20.1 255.255.255.0
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 32 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
! interface FastEthernet0/1.88 encapsulation dot1Q 88 ip address 172.17.88.1 255.255.255.0 ! ! ip route 172.17.30.0 255.255.255.0 172.17.88.35 ip route 172.17.40.0 255.255.255.0 172.17.88.25 ! ! ! ! line con 0 exec-timeout 0 0 logging synchronous password cisco line aux 0 line vty 0 4 ! ! end
Hostname S1 ! ! vtp mode transparent ! ! vlan 10,20,88 ! ! interface FastEthernet0/1 switchport trunk encapsulation switchport mode trunk ! interface FastEthernet0/2 switchport trunk encapsulation switchport mode trunk ! interface FastEthernet0/3 switchport trunk encapsulation switchport mode trunk ! interface FastEthernet0/4 switchport trunk encapsulation switchport mode trunk ! interface FastEthernet0/5 switchport trunk encapsulation switchport mode trunk ! line con 0 exec-timeout 0 0 logging synchronous
dot1q
dot1q
dot1q
dot1q
dot1q
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 33 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
! end
Hostname S2 ! ! vtp mode transparent ! vlan 10,20,88 ! ! interface FastEthernet0/1 switchport trunk encapsulation dot1q switchport mode trunk ! interface FastEthernet0/2 switchport trunk encapsulation dot1q switchport mode trunk ! interface FastEthernet0/3 switchport trunk encapsulation dot1q switchport mode trunk ! interface FastEthernet0/4 switchport trunk encapsulation dot1q switchport mode trunk ! interface FastEthernet0/7 switchport mode access switchport access vlan 88 ! ! ! PC1 and PC2s MAC address will appear after sticky on ports 11 ! and 18 respectively, after traffic traverses them ! ! interface FastEthernet0/11 switchport access vlan 10 switchport mode access switchport port-security switchport port-security mac-address switchport port-security mac-address ! interface FastEthernet0/18 switchport access vlan 20 switchport mode access switchport port-security switchport port-security mac-address switchport port-security mac-address ! line con 0 exec-timeout 0 0 logging synchronous
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 34 of 35
CCNA Exploration LAN Switching and Wireless: Wireless Concepts and Configuration
! end
Hostname S3 ! vtp mode transparent ! vlan 10,20,88 ! interface FastEthernet0/1 switchport trunk encapsulation switchport mode trunk ! interface FastEthernet0/2 switchport trunk encapsulation switchport mode trunk ! interface FastEthernet0/3 switchport trunk encapsulation switchport mode trunk ! interface FastEthernet0/4 switchport trunk encapsulation switchport mode trunk ! interface FastEthernet0/7 switchport mode access switchport access vlan 88 ! ! line con 0 exec-timeout 0 0 logging synchronous ! ! end
dot1q
dot1q
dot1q
dot1q
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 35 of 35