Hello and welcome back to I see. And you want interconnecting Cisco networking devices. Part one. This is the module to lab. I am Trend Arrow. And I'm gonna be instructor for this.
This video. I'm gonna show you some things that you should be. They should be ready to go figure, and I'll give it
You know what? You give it a go in the lab,
and when you're ready, go ahead and a NPAs video, and we'll walk through the lab together.
All right, So here is the lab diagram. Here's what you're gonna want to start with is you're gonna want to plug these into these interfaces. Go ahead and said, uh,
I P addresses. What I would do is just defaulted advice completely.
Um, you know, said you're walking synchronous on your lines. Cut. You know, here you want you can support in.
They even said to know I p domain look up.
Um, once you get these configured and they can ping each other, you verified the paying.
It will go ahead and go into the actual lab portion.
So here's the lab portion. We're going to create a user bob with the passer Super duper secret that is 95 hashed, right?
We're going to set the consul port to log in with a line password of I'm here in clear text.
And on the VT y lines, we're gonna end it. Enable s s h V two. We're gonna log in with the local database,
and we're gonna disable the tone it connections.
So we're gonna set the host to go. You can set the speed and duplex toe auto negotiation are sure that they're set out a negotiation.
For now, we're gonna configure port security, so devices A and B should be set with a sticky configuration
device. See? Should be set with a static configuration and advice. Aaron, sit as restrict device be will be protect. And if I see, will be the shutdown violation mode
on all three switch interfaces, sets a description to end user devices and quick hand to you should only have to type this description one time. So, see if you can remember how to do that.
All right. And go ahead and pause the video and go ahead and try and see if you can complete this lab.
All right, so I'm gonna go ahead and bring up the party session here. I want to verify that we can ping everything.
All right, so I've gone ahead and just verified that we can ping
So what I'm gonna do is we're gonna set up the user bob configuration terminal user name,
Bob Secret. Never actually want the every five hashed,
And let's go ahead and set the con support log in. So if you got a lion con zero line counsel zero,
we're just gonna do log in?
I hope so. I need to set the password.
It was sick. Log in.
So now the consul port said to the log in password of I'm here
and we're gonna go into the line. VT Why zero space. 15
friends transports and puts
We're going to do I log in local
so we don't have to explicitly say to not allow Tell my connection that by allowing Onley Shh, we are disallowing. Tell Matt
so we don't actually just sent that.
and we will go ahead and set the auto negotiation
for a speed into place.
So we can. I'm gonna set a interface range zero through one
you to add in that range command,
and we'll do a speed auto
And if you remember, we want to show Ron interface. FAA too.
It's not going to show it because it's the defaults.
Dis ensures that it is set. And someone you know, someone with the previous configuration didn't accidentally haven't. I do play half duplex at 10 megabits per second.
So let's go ahead and set up the port security
I want to do f A zero to. First,
we're gonna do the switchboard mod access
switch Port port security
And we want to set this one to restrict switchboards. Port security violation.
Restricts interface that phase 04 Next, we're gonna go into device to be
you. Want to switch ports? Mod access
switch Port port security enabled.
Switch ports, Port security. Mac address sticky.
And finally switch port port security
And let's move on to the last interface. If a 06 on the device see
so sweet. The road access switchboard court security enabled.
So remember, if you set the Mac address statically in port security, you cannot use that dynamic command you have to use
Just show Mac address, serene do.
Or you could do Mac address static.
Or we could just do secure if you want to see the ones that are set with port security.
So I just remembered I was just curious why I couldn't
send ah pings out from I can't leave you. I'm gonna forgot that for some reason, it has
to. Mac addresses somebody. Go ahead and go into interface configuration, and I must set the maximum. 22
port security, maximum two
doing shirts. No shirts, no space. Show
on. And we'll see if I can send these real quick.
Apparently, I just got to be more patient. Okay, here we go.
So now we can ping on the
Okay. We'll just do a recap here,
threw me off, and I can't figure out where I'm at, so also get FAA 02
So we have both max and sticky. Pull those in automatically. Restrict Maxwell too.
So it's going to number four.
Okay, So the Mac address on four needs to be
That is my other laptops. Someone sent a couple frames on that to get it going.
And my son in frames, I'm just more or less just mean I'm sending just a ping command.
So that way it just sends traffic. So now we have that Mac address, And if I remember right, we have not configured this one. Show
Run. Six. All right, so he had not done this. When you
So we're gonna go into configuration Terminal
and we got switchboard support. Security enabled. So the airport security
violation Shut down.
Secure. Okay, here we go.
So go ahead and copy this. All right, so now we can go to
switchboards Port security.
Did I see should be static. So port security Mac address. Right. Click paste. Enter.
Oh, you need to be a shutdown it for you. So we'll try that again,
and I will do no shuts.
All right. Right. So now if we do a show, Ron interface F a 06
we have it. So remember, we're not going to see the shutdown violation mode because it is defaulted.
So let's go ahead and let's go ahead and set the description on all three interfaces again.
So again, remember, we used the interface of range F A 02
It was such a description to and
do a show. Run here, Make sure we got everything.
All right. So I got used by with MD five.
So number one is checked off.
All right, so we got f a zero to was gonna device a real quick.
So we said it with a sticky configuration,
and it's in the restricted mode,
So device be should be sticky.
all right, we're in the shutdown mode causes defaulted,
and we have a static address.
And ever so four is checked off his well, because
the speed and duplex for autumn negotiation already because they're not in there. If you saw a speed or duplex command, that means they would actually be set.
What's going? Check off number four, check out number five.
description as well. So we got description
so I can check off number six.
I ask you going through.
So we got the log in
for the con supports,
so we'll check off number two in VT y lines. We have
transport import. Sssh! And one thing I realized you forgot to do was the SS H mode.
All right, so we're gonna do I p ss
And remember, in order to a few defaulted your device. One thing I need to do as well, you'll have to set your host name. Because remember, we have to do a crypto key generate
for the S h. So do hosting U. S. W one and you also to do a
Uh, I'm not gonna mess with Mike's. I don't know what it currently is, where we had to set the domain name as well. And then finally, we have to do a crypto.
We generate our essay
you can put in the module ISS, which is the 10 24 that we always type in.
Um, you know, generate that key.
So that is the last step to enabling SS H V two.
So that is checked off a cz Well
Oh, all right. I'm gonna take off the party session
all right. Hope you guys enjoyed that lab. Um, let me know what you guys think of it. If you liked it, What you didn't like, You know, we could address from there. Otherwise, if you have any questions, send you some help.
You didn't say message. Always thank you for doing this module. And I look forward to seeing you wrestle Lesson. Thank you.