The work implement the design can begin
Overview
Modern switches use VLANs to improve network performance by separating large Layer 2 broadcast domains into smaller ones. VLANs can also be used as a security measure by controlling which hosts can communicate. In general, VLANs make it easier to design a network to support the goals of an organization. VLAN trunks are used to span VLANs across multiple devices. Trunks allow the traffic from multiple VLANS to travel over a single link, while keeping the VLAN identification and segmentation intact.Objectives
• Design a Local Area Network using switches and hosts (computers)
• Create basic switch configurations necessary for switch maintenance and operation • Define Virtual LANs (VLANs) to enforce segmentation
• Implement necessary VLAN trunking to extend a VLAN across the LAN• The two switches must be named S1 and S2.
• The three computers must be named PC-A, PC-B, and PC-C.
2.2. Configure the basic switch functions
Configure the basic functions in both S1 and S2 as follows:
• Set the enable secret to “class”
• Set the line con 0 password to “cisco”
• Set the line vty 0 15 password to “cisco”
• Set the MOTD to “Unauthorized access is strictly prohibited.” • Set logging to synchronous2.3 Configure the computers
Configure the three computers as follows:
2.4 Test and Validate Connectivity
Use ping to test connectivity between the computers. Detail your results in your project document, both what works and what doesn’t work.
Device | Interfaces | VLAN / IP Address |
---|---|---|
6, 12 – 20, 22-23 | ||
|
|
|
192.168.1.11 255.255.255.0 | ||
|
|
|
|
192.168.1.12 255.255.255.0 |
Version 1.0
project document, both what works and what doesn’t work.