11.6.2 Switch security configuration

11.6.2 Switch security configuration

VIDEO 

    Latar Belakang / Skenario

Ini adalah lab komprehensif untuk meninjau fitur keamanan Lapisan 2 yang telah dibahas sebelumnya.

Catatan: Router yang digunakan dengan lab praktik CCNA adalah Cisco 4221 dengan Cisco IOS XE Rilis 16.9.3

(gambar universalk9). Switch yang digunakan di laboratorium adalah Cisco Catalyst 2960s dengan Cisco IOS Release 15.0(2)

(gambar lanbasek9). Router, switch, dan versi Cisco IOS lainnya dapat digunakan. Tergantung pada modelnya

dan versi Cisco IOS, perintah yang tersedia dan output yang dihasilkan mungkin berbeda dari yang ditampilkan laboratorium.

    Langkah-Langkah

    Bagian 1: Konfigurasikan Perangkat Jaringan.

Langkah 1: Hubungkan jaringan.

  •  Kabel jaringan seperti yang ditunjukkan pada topologi.
  •  Inisialisasi perangkat.
Langkah 2 : Konfigurasi router

Router>enable

Router#configure terminal
Router#hostname R1
R1#(config)no ip domain lookup
R1#(config)ip dhcp excluded-address 192.168.10.1 192.168.10.9
R1#(config)ip dhcp excluded-address 192.168.10.201 192.168.10.202

R1#(config)ip dhcp pool Students
R1#(config)network 192.168.10.0 255.255.255.0
R1#(config)default-router 192.168.10.1
R1#(config)domain-name CCNA2.Lab-11.6.1

R1#(config)interface Loopback0
R1#(config)ip address 10.10.1.1 255.255.255.0

R1#(config-if)interface GigabitEthernet0/0/1
R1#(config-if)description Link to S1 Port 5
R1#(config-if)ip dhcp relay information trusted
R1#(config-if)ip address 192.168.10.1 255.255.255.0
R1#(config-if) no shutdown

R1#(config)line con 0
R1#(config) logging synchronous
R1#(config)exec-timeout 0 0

Langkah 3 : Konfigurasi semua switch

Switch# config t
Switch(config)# hostname S1

Switch# config t
Switch(config)# hostname S2

S1(config)# no ip domain-lookup
S2(config)# no ip domain-lookup

S1(config)# interface f0/1
S1(config-if)# description Link to S2
S1(config-if)# interface f0/5
S1(config-if)# description Link to R1
S1(config-if)# interface f0/6
S1(config-if)# description Link to PC-A

S2(config)# interface f0/1
S2(config-if)# description Link to S1
S2(config-if)# interface f0/18
S2(config-if)# description Link to PC-B

S1(config)# ip default-gateway 192.168.10.1
S2(config)# ip default-gateway 192.168.10.1

Langkah 4: Konfigurasikan SVI untuk VLAN 10.

S1(config)# interface vlan 10
S1(config-if)# ip address 192.168.10.201 255.255.255.0
S1(config-if)# description Management SVI
S1(config-if)# no shutdown

S2(config)# interface vlan 10
S2(config-if)# ip address 192.168.10.202 255.255.255.0
S2(config-if)# description Management SVI
S2(config-if)# no shutdown

S1(config)# vlan 333
S1(config-vlan)# name Native

S2(config)# vlan 333
S2(config-vlan)# name Native

S1(config-vlan)# vlan 999
S1(config-vlan)# name ParkingLot

S2(config-vlan)# vlan 999
S2(config-vlan)# name ParkingLot

Bagian 3: Konfigurasikan Keamanan Switch.

S1(config)# interface f0/1
S1(config-if)# switchport mode trunk
S1(config-if)# switchport trunk native vlan 333

S2(config)# interface f0/1
S2(config-if)# switchport mode trunk
S2(config-if)# switchport trunk native vlan 333

S1(config)# interface f0/1
S1(config-if)# switchport nonegotiate

S2(config)# interface f0/1
S2(config-if)# switchport nonegotiate

Langkah 2: Konfigurasikan port akses.

S1(config)# interface range f0/5-6
S1(config-if)# switchport mode access
S1(config-if)# switchport access vlan 10

S2(config)# interface f0/18
S2(config-if)# switchport mode access
S2(config-if)# switchport access vlan 10

S1(config)# interface f0/6
S1(config-if)# switchport port-security
S1(config-if)# switchport port-security maximum 3
S1(config-if)# switchport port-security violation restrict
S1(config-if)# switchport port-security aging time 60
S1(config-if)# switchport port-security aging type inactivity

S2(config)# interface f0/18
S2(config-if)# switchport port-security
S2(config-if)# switchport port-security mac-address sticky

S2(config)# interface f0/18
S2(config-if)# switchport port-security aging time 60
S2(config-if)# switchport port-security maximum 2
S2(config-if)# switchport port-security violation protect

Langkah 3 : Terapkan keamanan pengintaian DHCP.

S2(config)# ip dhcp snooping
S2(config)# ip dhcp snooping vlan 10

S2(config)# interface f0/1
S2(config-if)# ip dhcp snooping trust

S2(config)# interface f0/18
S2(config-if)# ip dhcp snooping limit rate 5

Langkah 4: Terapkan penjaga PortFast dan BPDU.

S1(config)# interface range f0/5-6
S1(config-if)# spanning-tree portfast

S2(config)# interface f0/18
S2(config-if)# spanning-tree portfast

S1(config)# interface f0/6
S1(config-if)# spanning-tree bpduguard enable

S2(config)# interface f0/18
S2(config-if)# spanning-tree bpduguard enable

Komentar

Postingan populer dari blog ini

Installasi/Konfigurasi Server DNS Red Hat Enterprise Linux (RHEL)

Installasi Web Server di Red Hat Enterprise Linux (RHEL)

install dan konfigurasi LMS (moodle) di Red Hat Enterprise Linux (RHEL)