Switch ports security is a serious security concern to computer networks. As a network specialist consultant, you have been approached by a start-up company to implement some port security...


Switch ports security is a serious security concern to computer networks. As a network specialist

consultant, you have been approached by a start-up company to implement some port security

configurations on the newly acquired switch on their network. They want you to restrict access on

the switch only to authorised devices. Below is the start-up network overview:
A hub (Hub-PT Hub0) is placed in the director’s office and connected to the switch (2960-24TT

Switch 0). Another hub (Hub-PT Hub1) is placed in the developers’ lab and it is connected to

the switch (2960-24TT Switch 0) as well. The switch Switch0 enables hosts on the network

to access data on the server Server0.
3.1 Create this network on packet tracer using the information below.

• Connect a Laptop (Laptop0) Fa0 to Hub0 Fa0; then connect Hub0 Fa3 to the Switch0
Fa0/1.
• Connect a PC (PC0) Fa0 to Hub1 Fa0;

• Connect a PC (PC1) Fa0 to Hub1 Fa1;

• Connect a PC (PC2) Fa0 to Hub1 Fa2;

• Connect Hub1 Fa3 to Switch0 Fa0/2.
• Connect Switch0 Fa3 to Server0 Fa0
Then, configure the end devices with the following static IP addresses:
• Laptop0 (192.168.60.2 255.255.255.0),

• PC0 (192.168.60.3 255.255.255.0),

• PC1 (192.168.60.4 255.255.255.0) and

• PC2 (192.168.60.5 255.255.255.0)
• Server0 (192.168.60.100 255.255.255.0)



Jun 05, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here