: Minimizing Service Loss and Data Theft in a Switched Network

Lab Exercise: Configuring Protected Ports

The student will configure Private VLAN Edge protected ports.

Lab Exercise 1: Catalyst 2950 and 3550 Series Intra-VLAN Security

Configure intra-VLAN security with Access Control Lists (ACLs) using the command-line interface (CLI) mode.

Lab Exercise 2: Configuring VLAN Maps

In this lab, students will configure VLAN Access Control Lists (ACLs) for IP addresses in a common VLAN.

e-Lab Activity: Optimizing and Securing Multilayer Switched Networks

In this lab, the student will configure VLAN access control lists (VACLs) and a Terminal Access Controller Access Control System + (TACACS+) server.

Lab Exercise 1: Restricting Virtual Terminal Sessions with Access Lists

In this lab, students will define and apply access lists to restrict access to virtual terminal sessions on the switch.

Lab Exercise 2: Restricting Web Interface Sessions with Access Lists

In this lab, students will define and apply access lists to restrict access to the Web interface on the switch.

Lab Exercise 1: Setting Encrypted Passwords

In this lab students will configure passwords on switch console ports and virtual terminal lines.

Lab Exercise 2: Using Local Usernames and Passwords

In this lab, students will configure multiple local usernames with passwords. These will be used for login authentication on the console port and virtual terminal lines.

Lab Exercise 4: Configuring the Management VLAN on a Single Switch

In this lab, students will configure and use a non-default Management VLAN.

Lab Exercise 1: Creating a Switched Port Analyzer (SPAN) Session

In this lab a Switched Port Analyzer (SPAN) session will be created to remotely monitor network traffic.

Lab Exercise 2: Creating a VSPAN Session

In this lab a VLAN Switchport Analyzer (VSPAN) session is created to remotely monitor network traffic.

Lab Exercise 3: Creating a RSPAN Session

In this lab a Remote Switchport Analyzer (RSPAN) session will be created on two switches to remotely monitor network traffic.




Close Window
All contents copyright ©2001-2005 Cisco Systems, Inc. All rights reserved.