6.5.1.3 Packet Tracer - Layer 2 VLAN Security - T
6.5.1.3 Packet Tracer - Layer 2 VLAN Security - T
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
Objectives
Connect a new redundant link between SW-1 and SW-2.
Enable trunking and configure security on the new trunk link between SW-1 and SW-2.
Create a new management VLAN (VLAN 20) and attach a management PC to that VLAN.
Implement an ACL to prevent outside users from accessing the management VLAN.
Background / Scenario
A company’s network is currently set up using two separate VLANs: VLAN 5 and VLAN 10. In addition, all
trunk ports are configured with native VLAN 15. A network administrator wants to add a redundant link
between switch SW-1 and SW-2. The link must have trunking enabled and all security requirements should
be in place.
In addition, the network administrator wants to connect a management PC to switch SW-A. The administrator
would like to allow the management PC to be able to connect to all switches and the router, but does not want
any other devices to connect to the management PC or the switches. The administrator would like to create a
new VLAN 20 for management purposes.
All devices have been preconfigured with:
o Enable secret password: ciscoenpa55
o Console password: ciscoconpa55
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of
Packet Tracer - Layer 2 VLAN Security
C3 (VLAN 10).
D1 (VLAN 5).
Note: If using the simple PDU GUI packet, be sure to ping twice to allow for ARP.
Packet Tracer - Layer 2 VLAN Security
Step 2: Enable trunking, including all trunk security mechanisms on the link
between SW-1 and SW-2.
Trunking has already been configured on all pre-existing trunk interfaces. The new link
must be configured for trunking, including all trunk security mechanisms. On both SW-1
and SW-2, set the port to trunk, assign native VLAN 15 to the trunk port, and disable auto-
negotiation.
Packet Tracer - Layer 2 VLAN Security
Packet Tracer - Layer 2 VLAN Security
b. Create an interface VLAN 20 and assign an IP address within the 192.168.20.0/24 network.
El ping debería haber fallado. Esto se debe a que para que un dispositivo dentro de una VLAN diferente haga
ping con éxito a un dispositivo dentro de VLAN20, debe enrutarse. El enrutador tiene una ACL que impide que todos
los paquetes accedan a la red 192.168.20.0.
Step 5: Check results.
Your completion percentage should be 100%. Click Check Results to see feedback and verification of which
required components have been completed.
If all components appear to be correct and the activity still shows incomplete, it could be due to the
connectivity tests that verify the ACL operation.