Configuración SSH - Configuración Switchport Security

Descargar como docx, pdf o txt
Descargar como docx, pdf o txt
Está en la página 1de 11

PT: Desafío de integración de habilidades

Configuración de Switch y Host en una LAN

Tabla de direccionamiento

Máscara de
Dispositivo Interfaz Dirección IP subred

Switch1 VLAN 1 192.168.10.10 255.255.255.0

Switch2 VLAN 1 192.168.10.11 255.255.255.0

PC-1 NIC 192.168.10.20 255.255.255.0

PC-2 NIC 192.168.10.21 255.255.255.0

Objetivos

 Configurar los nombres de host y las direcciones IP en dos switches con sistema
operativo Internetwork (IOS) de Cisco mediante la interfaz de línea de comandos (CLI).
 Utilizar comandos del IOS de Cisco para especificar o limitar el acceso a las
configuraciones de los dispositivos.
 Utilizar comandos del IOS para guardar la configuración en ejecución.
 Configurar dos dispositivos host con direcciones IP.
 Verificar la conectividad entre dos terminales PC.

Situación

Como técnico de LAN contratado recientemente, el administrador de red le solicitó que


demuestre su habilidad para configurar una LAN pequeña. Sus tareas incluyen la configuración
de parámetros iniciales en dos switches mediante el IOS de Cisco y la configuración de
parámetros de dirección IP en dispositivos host para proporcionar conectividad de extremo a
extremo. Debe utilizar dos switches y dos hosts/PC en una red conectada por cable y con
alimentación.

Requisitos

Utilice una conexión de consola para acceder a cada switch.

Nombre los switches Switch1 y Switch2

Utilice la contraseña class para todas las líneas.

Utilice la contraseña secreta class

Cifre todas las contraseñas de texto no cifrado.

Incluya la palabra warning (advertencia) en el aviso del mensaje del día (MOTD).
Configure el direccionamiento para todos los dispositivos de acuerdo con la tabla de
direccionamiento.

Guarde las configuraciones.


Verifique la conectividad entre todos los dispositivos.

Nota: haga clic en Check Results (Verificar resultados) para ver su progreso. Haga clic en
Reset Activity (Restablecer actividad) para generar un nuevo conjunto de requisitos.
Packet Tracer - Configuring SSH
Topology

Addressing Table

Device Interface IP Address Subnet Mask

S1 VLAN 1 10.10.10.2 255.255.255.0

PC1 NIC 10.10.10.10 255.255.255.0

Objectives
Part 1: Secure Passwords
Part 2: Encrypt Communications
Part 3: Verify SSH Implementation

Background
SSH should replace Telnet for management connections. Telnet uses insecure plain text
communications. SSH provides security for remote connections by providing strong encryption of all
transmitted data between devices. In this activity, you will secure a remote switch with password
encryption and SSH.

Part 1: Secure Passwords


a. Using the command prompt on PC1, Telnet to S1. The user EXEC and privileged EXEC password
is cisco.
b. Save the current configuration so that any mistakes you might make can be reversed by
toggling the power for S1.
c. Show the current configuration and note that the passwords are in plain text. Enter the
command that encrypts plain text passwords.
service password-encryption
d. Verify that the passwords are encrypted.
Part 2: Encrypt Communications
Step 1: Set the IP domain name and generate secure keys.
It is generally not safe to use Telnet, because data is transferred in plain text. Therefore, use SSH
whenever it is available.
a. Configure the domain name to be netacad.pka

ip domain-name netacad.pka
b. Secure keys are needed to encrypt the data. Generate the RSA keys using a 1024 key length.

crypto key generate rsa


Modulo 1024
Step 2: Create an SSH user and reconfigure the VTY lines for SSH-only access.
a. Create an administrator user with cisco as the secret password.

username administrator secret cisco


b. Configure the VTY lines to check the local username database for login credentials and to only
allow SSH for remote access. Remove the existing vty line password.

Part 3: Verify SSH Implementation


a. Exit the Telnet session and attempt to log back in using Telnet. The attempt should fail.
b. Attempt to log in using SSH. Type ssh and press Enter without any parameters to reveal the
command usage instructions. Hint: The -l option is the letter “L”, not the number 1.
Upon successful login, enter privileged EXEC mode and save the configuration. If you were
unable to successfully access S1, toggle the power and begin again
Packet Tracer - Configuring Switch Port Security
Topology

Addressing Table

Device Interface IP Address Subnet Mask

S1 VLAN 1 10.10.10.2 255.255.255.0

PC1 NIC 10.10.10.10 255.255.255.0

PC2 NIC 10.10.10.11 255.255.255.0

Rogue Laptop NIC 10.10.10.12 255.255.255.0

Objective
Part 1: Configure Port Security
Part 2: Verify Port Security

Background
In this activity, you will configure and verify port security on a switch. Port security allows you to
restrict a port’s ingress traffic by limiting the MAC addresses that are allowed to send traffic into the
port.

Part 4: Configure Port Security


a. Access the command line for S1 and enable port security on Fast Ethernet ports 0/1 and 0/2.

S1(config)#int range fa0/1 – 2


S1(config-if-range)#switchport mode access
S1(config-if-range)#switchport port-security
b. Set the maximum so that only one device can access the Fast Ethernet ports 0/1 and 0/2.

S1(config-if-range)# switchport port-security maximum 1


c. Secure the ports so that the MAC address of a device is dynamically learned and added to the
running configuration.
Verificamos cual es la MAC de cada PC (ipconfig/all).

S1(config)#switchport port-security mac-address sticky


S1(config)#switchport port-security mac-address sticky (-MAC-)

d. Set the violation so that the Fast Ethernet ports 0/1 and 0/2 are not disabled when a violation
occurs, but packets are dropped from an unknown source.

S1(config-if-range)#switchport port-security violation restrict


e. Disable all the remaining unused ports. Hint: Use the range keyword to apply this configuration
to all the ports simultaneously.
S1(config)#int range fa0/3 – 24 , gi0/1 – 2
S1(config-if-range)#shutdown

Part 5: Verify Port Security


a. From PC1, ping PC2.
b. Verify port security is enabled and the MAC addresses of PC1 and PC2 were added to the
running configuration.
c. Attach Rogue Laptop to any unused switch port and notice that the link lights are red.
d. Enable the port and verify that Rogue Laptop can ping PC1 and PC2. After verification, shut
down the port connected to Rogue Laptop.
e. Disconnect PC2 and connect Rogue Laptop to PC2’s port. Verify that Rogue Laptop is unable to
ping PC1.
f. Display the port security violations for the port Rogue Laptop is connected to.

g. Disconnect Rouge Laptop and reconnect PC2. Verify PC2 can ping PC1.
h. Why is PC2 able to ping PC1, but the Rouge Laptop is not?
Por que al configurar la seguridad de los puertos y ponerle la MAC de PC1 y PC2 a cada
puerto, estos no aceptan otra MAC de otro dispositivo, solo de las que se aprendieron
primero.
CONCLUSIONES:

- Aprendimos a darle seguridad a los puertos de un switch mediante el

comando switch port.

- Aprendimos las diversas formas de violaciones a los puertos de un

switch (shutdown, restrict y protect).

- Creamos un usuario SSH y configuramos las líneas VTY para que solo

se acceda por SSH.

Lima, 2018
TECSUP

También podría gustarte