Switch ports security is a serious security concern to computer networks. As a network specialistconsultant, you have been approached by a start-up company to implement some port securityconfigurations on the newly acquired switch on their network. They want you to restrict access onthe switch only to authorised devices. Below is the start-up network overview:A hub (Hub-PT Hub0) is placed in the director’s office and connected to the switch (2960-24TTSwitch 0). Another hub (Hub-PT Hub1) is placed in the developers’ lab and it is connected tothe switch (2960-24TT Switch 0) as well. The switch Switch0 enables hosts on the networkto access data on the server Server0.3.1 Create this network on packet tracer using the information below.• Connect a Laptop (Laptop0) Fa0 to Hub0 Fa0; then connect Hub0 Fa3 to the Switch0Fa0/1.• Connect a PC (PC0) Fa0 to Hub1 Fa0;• Connect a PC (PC1) Fa0 to Hub1 Fa1;• Connect a PC (PC2) Fa0 to Hub1 Fa2;• Connect Hub1 Fa3 to Switch0 Fa0/2.• Connect Switch0 Fa3 to Server0 Fa0Then, configure the end devices with the following static IP addresses:• Laptop0 (192.168.60.2 255.255.255.0),• PC0 (192.168.60.3 255.255.255.0),• PC1 (192.168.60.4 255.255.255.0) and• PC2 (192.168.60.5 255.255.255.0)• Server0 (192.168.60.100 255.255.255.0)
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here