Time
23 hours 18 minutes
Difficulty
Beginner
CEU/CPE
14

Video Transcription

00:00
Hello and welcome back to I see. And you want interconnecting Cisco networking devices. Part one. This is the module to lab. I am Trend Arrow. And I'm gonna be instructor for this.
00:10
This video. I'm gonna show you some things that you should be. They should be ready to go figure, and I'll give it
00:17
You know what? You give it a go in the lab,
00:19
and when you're ready, go ahead and a NPAs video, and we'll walk through the lab together.
00:27
All right, So here is the lab diagram. Here's what you're gonna want to start with is you're gonna want to plug these into these interfaces. Go ahead and said, uh,
00:35
I P addresses. What I would do is just defaulted advice completely.
00:41
Um, you know, said you're walking synchronous on your lines. Cut. You know, here you want you can support in.
00:49
They even said to know I p domain look up.
00:53
Um, once you get these configured and they can ping each other, you verified the paying.
00:58
It will go ahead and go into the actual lab portion.
01:03
So here's the lab portion. We're going to create a user bob with the passer Super duper secret that is 95 hashed, right?
01:11
We're going to set the consul port to log in with a line password of I'm here in clear text.
01:17
And on the VT y lines, we're gonna end it. Enable s s h V two. We're gonna log in with the local database,
01:23
and we're gonna disable the tone it connections.
01:29
So we're gonna set the host to go. You can set the speed and duplex toe auto negotiation are sure that they're set out a negotiation.
01:38
For now, we're gonna configure port security, so devices A and B should be set with a sticky configuration
01:45
device. See? Should be set with a static configuration and advice. Aaron, sit as restrict device be will be protect. And if I see, will be the shutdown violation mode
01:57
on all three switch interfaces, sets a description to end user devices and quick hand to you should only have to type this description one time. So, see if you can remember how to do that.
02:08
All right. And go ahead and pause the video and go ahead and try and see if you can complete this lab.
02:20
All right, so I'm gonna go ahead and bring up the party session here. I want to verify that we can ping everything.
02:28
All right, so I've gone ahead and just verified that we can ping
02:30
50
02:32
being 75 Ping 100.
02:36
So what I'm gonna do is we're gonna set up the user bob configuration terminal user name,
02:42
Bob Secret. Never actually want the every five hashed,
02:46
super duper secret.
02:52
And let's go ahead and set the con support log in. So if you got a lion con zero line counsel zero,
03:00
we're just gonna do log in?
03:04
I hope so. I need to set the password.
03:07
I'm here.
03:10
It was sick. Log in.
03:13
So now the consul port said to the log in password of I'm here
03:19
and we're gonna go into the line. VT Why zero space. 15
03:25
friends transports and puts
03:30
sssh
03:34
We're going to do I log in local
03:38
so we don't have to explicitly say to not allow Tell my connection that by allowing Onley Shh, we are disallowing. Tell Matt
03:46
so we don't actually just sent that.
03:51
So their end
03:52
figured terminal
03:54
and we will go ahead and set the auto negotiation
03:59
for a speed into place.
04:00
So we can. I'm gonna set a interface range zero through one
04:06
if you're on to.
04:11
I can't. If a 04
04:14
Okay, six
04:16
you to add in that range command,
04:21
and we'll do a speed auto
04:26
duplex.
04:30
And if you remember, we want to show Ron interface. FAA too.
04:33
It's not going to show it because it's the defaults.
04:36
Dis ensures that it is set. And someone you know, someone with the previous configuration didn't accidentally haven't. I do play half duplex at 10 megabits per second.
04:46
So let's go ahead and set up the port security
04:50
configure criminal.
04:54
I want to do f A zero to. First,
04:57
we're gonna do the switchboard mod access
05:02
switch Port port security
05:08
words. Wow.
05:13
Mac address sticky.
05:16
And we want to set this one to restrict switchboards. Port security violation.
05:24
Restricts interface that phase 04 Next, we're gonna go into device to be
05:30
you. Want to switch ports? Mod access
05:33
switch Port port security enabled.
05:38
Switch ports, Port security. Mac address sticky.
05:44
And finally switch port port security
05:46
violation.
05:49
Pro checked.
05:51
And let's move on to the last interface. If a 06 on the device see
05:59
so sweet. The road access switchboard court security enabled.
06:04
So remember, if you set the Mac address statically in port security, you cannot use that dynamic command you have to use
06:15
Just show Mac address, serene do.
06:20
Or you could do Mac address static.
06:24
Or we could just do secure if you want to see the ones that are set with port security.
06:29
So I just remembered I was just curious why I couldn't
06:32
send ah pings out from I can't leave you. I'm gonna forgot that for some reason, it has
06:38
to. Mac addresses somebody. Go ahead and go into interface configuration, and I must set the maximum. 22
06:45
port security, maximum two
06:49
doing shirts. No shirts, no space. Show
06:57
on. And we'll see if I can send these real quick.
07:01
Apparently, I just got to be more patient. Okay, here we go.
07:05
So now we can ping on the
07:08
device one.
07:10
Okay. We'll just do a recap here,
07:13
threw me off, and I can't figure out where I'm at, so also get FAA 02
07:19
So we have both max and sticky. Pull those in automatically. Restrict Maxwell too.
07:26
So it's going to number four.
07:29
Okay, So the Mac address on four needs to be
07:32
pulled in.
07:34
That is my other laptops. Someone sent a couple frames on that to get it going.
07:40
And my son in frames, I'm just more or less just mean I'm sending just a ping command.
07:46
So that way it just sends traffic. So now we have that Mac address, And if I remember right, we have not configured this one. Show
07:55
Run. Six. All right, so he had not done this. When you
08:01
So we're gonna go into configuration Terminal
08:03
Interfet 06
08:05
and we got switchboard support. Security enabled. So the airport security
08:11
violation Shut down.
08:16
Secure. Okay, here we go.
08:20
So go ahead and copy this. All right, so now we can go to
08:26
switchboards Port security.
08:28
Did I see should be static. So port security Mac address. Right. Click paste. Enter.
08:37
Oh, you need to be a shutdown it for you. So we'll try that again,
08:41
and I will do no shuts.
08:46
All right. Right. So now if we do a show, Ron interface F a 06
08:52
we have it. So remember, we're not going to see the shutdown violation mode because it is defaulted.
09:00
So let's go ahead and let's go ahead and set the description on all three interfaces again.
09:07
So again, remember, we used the interface of range F A 02
09:11
Uh, a A four a six.
09:18
It was such a description to and
09:20
user devices
09:24
and
09:26
do a show. Run here, Make sure we got everything.
09:30
All right. So I got used by with MD five.
09:35
So number one is checked off.
09:39
All right, so we got f a zero to was gonna device a real quick.
09:45
So we said it with a sticky configuration,
09:48
and it's in the restricted mode,
09:52
So device be should be sticky.
09:56
It is in the
09:58
protect mode.
10:01
And if I see
10:05
right here,
10:05
all right, we're in the shutdown mode causes defaulted,
10:09
and we have a static address.
10:11
And ever so four is checked off his well, because
10:16
the speed and duplex for autumn negotiation already because they're not in there. If you saw a speed or duplex command, that means they would actually be set.
10:26
What's going? Check off number four, check out number five.
10:33
And you saw the
10:35
description as well. So we got description
10:37
so I can check off number six.
10:41
I ask you going through.
10:45
All right.
10:48
So we got the log in
10:52
for the con supports,
10:54
so we'll check off number two in VT y lines. We have
11:00
the log and local
11:01
transport import. Sssh! And one thing I realized you forgot to do was the SS H mode.
11:09
All right, so we're gonna do I p ss
11:13
h
11:16
version, too.
11:18
And remember, in order to a few defaulted your device. One thing I need to do as well, you'll have to set your host name. Because remember, we have to do a crypto key generate
11:28
for the S h. So do hosting U. S. W one and you also to do a
11:33
domain
11:35
dash name.
11:39
Uh, I'm not gonna mess with Mike's. I don't know what it currently is, where we had to set the domain name as well. And then finally, we have to do a crypto.
11:46
We generate our essay
11:50
you can put in the module ISS, which is the 10 24 that we always type in.
11:58
Um, you know, generate that key.
12:01
So that is the last step to enabling SS H V two.
12:09
So that is checked off a cz Well
12:11
Oh, all right. I'm gonna take off the party session
12:16
all right. Hope you guys enjoyed that lab. Um, let me know what you guys think of it. If you liked it, What you didn't like, You know, we could address from there. Otherwise, if you have any questions, send you some help.
12:28
You didn't say message. Always thank you for doing this module. And I look forward to seeing you wrestle Lesson. Thank you.

Up Next

CCNA ICND1

This course will enable students to understand virtualization and cloud services, and network programmability related to LAN, access and core segments.

Instructed By

Instructor Profile Image
Trenton Darrow
Network Engineer at NCI Information Systems, Inc
Instructor