You have been tasked with implementing the above access control as a pre-condition to installing the servers
exhibit LAB 4?
Acme is a small shipping company that has an existing enterprise network comprised of 2 switches; DSW1 and ASW2. The topology diagram indicates their layer 2 mapping. VLAN 40 is a new VLAN that will be used to provide the shipping personnel access to the server. For security reasons, it is necessary to restrict access to VLAN 20 in the following manner:
– Users connecting to ASW1s port must be authenticate before they are given access to the network. Authentication is to be done via a Radius server:
– Radius server host: 172.120.39.46
– Radius key: rad123
– Authentication should be implemented as close to the host device possible.
– Devices on VLAN 20 are restricted to in the address range of 172.120.40.0/24.
– Packets from devices in the address range of 172.120.40.0/24 should be passed on VLAN 20.
– Packets from devices in any other address range should be dropped on VLAN 20.
– Filtering should be implemented as close to the server farm as possible.
The Radius server and application servers will be installed at a future date. You have been tasked with implementing the above access control as a pre-condition to installing the servers. You must use the available IOS switch features.
Switch 1 provision ws-c3750g-24t
!
ip subnet-zero
These are your specific tasks…
exhibit LAB 2?
VTP Domain name : cisco
VLAN Ids 20 31
IP Addresses 172.16.71.1/24 172.16.132.1/24
These are your specific tasks:
1. Configure the VTP information with the distribution layer switch as the VTP server
2. Configure the VTP information with the access layer switch as a VTP client
3. Configure VLANs on the distribution layer switch
4. Configure inter-VLAN routing on the distribution layer switch
5. Specific VLAN port assignments will be made as users are added to the access layer switches in the future.
6. All VLANs and VTP configurations are to completed in the global configuration To configure the switch click on the host icon that is connected to the switch be way of a serial console cable.
which statement is true about an attempt to ping from host to host?
Refer to the exhibit. Both host stations are part of the same subnet but are in different VLANs. On the basis of the information presented in the exhibit, which statement is true about an attempt to ping from host to host?
Select the best response.
What statement is true about the configuration on switch CAT1?
Refer to the exhibit. What statement is true about the configuration on switch CAT1? Select the best response.
Which statement is true about the voice traffic coming to the switch access port that is connected to the IP p
Refer to the exhibit. Which statement is true about the voice traffic coming to the switch access port that is connected to the IP phone?
Select the best response.
Which statement is true when voice traffic is forwarded on the same VLAN used by the data traffic?
Refer to the exhibit. Which statement is true when voice traffic is forwarded on the same VLAN used by the data traffic?
Select the best response.
when an 802.1x-enabled client connects to the port?
Refer to the exhibit. How will interface FastEthernnet0/1 respond when an 802.1x-enabled client connects to the port?
Select the best response.
What will happen to traffic within VLAN 14 with a source address of 172.16.10.5?
Refer to the exhibit. What will happen to traffic within VLAN 14 with a source address of 172.16.10.5?
Select the best response.
What will happen when one more user is connected to interface FastEthernet 5/1?
Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1?
Select the best response.
Which interface or interfaces on switch SW_A can have the port security feature enabled?
Refer to the exhibit. Which interface or interfaces on switch SW_A can have the port security feature enabled?
Select the best response.