Rabu, 08 Desember 2010

Tugas CCNA 3 Lab 2.3.5 Configuring Basic Routing and Switching

Lab 2.3.5 Configuring Basic Routing and Switching

Step 1: Connect PC1 to the switch
Step 2: Perform an initial configuration on the switch
a.       Configure the hostname of the switch as Switch1.
b.      Set the privileged EXEC mode password to cisco.
c. Set the privileged EXEC mode secret password to class
d.      Configure the console and virtual terminal lines to use a password and require it at login.
e.       Exit from the console session and log in again. Which password was required? Password yang sudah kita konfigurasikan di console  session yaitu password yang ada pada terminal pertama. password yang digunakan ialah cisco
Why?  Karena pada saat pengaturan kita telah memerintahkan setiap melakukan login pada sebuah terminal maka kita harus memasukkan password. karena untuk mengakses kelas atau host yang telah dibentuk menggunakan konfigurasi pada switch, sehingga kelas tersebut bersifat tertutup, sehingga membutuhkan password untuk login.
Step 3: Configure the switch management interface on VLAN 1
a.       Enter the interface configuration mode for VLAN 1.
b.      Set the IP address, subnet mask, and default gateway for the management interface.
Why does interface VLAN1 require an IP address in this LAN?  Interface dari VLAN akan memenejmen IP address di setiap computer yang berada di LAN. dibutuhkan alamt IP pada VLAN ini karena mengkonfigurasi dua router dengan menggunakan rute statis dan kemudian menggunakan protokol routing
c.       What is the purpose of the default gateway? Tujuan dari Default gateway adalah untuk melewatkan IP address yang berada di LAN yang berbeda.
Step 4: Verify configuration of the switch
Step 5: Perform basic configuration of router R1
a.       Connect switch port Fa0/3 to interface Fa0/0 of router R1.
b.      Establish a terminal emulation session to router R1 from PC1.
c.       Enter privileged EXEC mode, and then global configuration mode.
d.      Configure the router name as R1.
e.       Disable DNS lookup
Why would DNS lookup be disabled in a lab environment?
karena jika menggunakan DNS IP address yang telah terdaftar saja yang bisa menggunakan jaringan, karena pada pengaturan ini IP address terdaftar secara otomatis.
f.       Configure the EXEC mode password
Why is it not necessary to use the enable password password command?
karena telah dikonfigurasi sebelumnya , yaitu member password pada pengaturan host, sehingga tidak diperlukan lagi password pada password command.
g.      Configure a message-of-the-day banner using the banner motd command. Where does this banner display? Banner display berada di
h.      Configure the console and virtual terminal lines to use a password and require it at login.
Step 6: Configure interfaces and static routing on router R1
a.       Configure the FastEthernet 0/0 interface with the IP address 192.168.1.1/24.
b.      Configure the Serial 0/0/0 interface with the IP address 192.168.2.1/24. Set the clock rate to 64000.
c.       Return to global configuration mode.
d.      Create a static route to enable R1 to reach the network attached to the R2 Fa0/0 interface. Use the next hop interface on R2 as the path to this network.
Why is this static route the only one required?
karena Konfigurasi interface dan statis routing pada router R1 telah mendaftarkan terlebih dahulu IP address statis yang diperlukan.
e.       Return to privileged EXEC mode.
f.       Save the configuration.
g.      Shut down R1.
Step 7: Connect PC2 to router R2
a.       Connect PC2 to the Fast Ethernet interface 0/0 of router R2. What kind of cable is required to connect a host directly to a router Ethernet port?
‘               jenis kabel twisted, atau UTP
b.      Establish a terminal emulation session with router R2 from PC2
Step 8: Perform basic configuration of router R2
Step 9: Connect the internetwork
Step 10: Verify and test the configurations
a.       To verify that PC1 and Switch1 are correctly configured, ping the switch IP address from PC1.
b.      To verify that Switch1 and R1 are correctly configured, ping the router Fa0/0 interface (default gateway) IP address from the Switch1 CLI.
c.        To verify that PC2 and R2 are correctly configured, ping the router Fa0/0 interface from PC2. Were the pings successful? Ya berhasil
d.      Verify that the routing tables have routes to all configured networks by using the show ip route command. What does the “S” indicate?
symbol “S” merupaakn pembatasan hak akses yang berarti security, karena telah dikonfigurasikan pada tahapan awal tadi.
e.       Verify the router interface configurations using the show ip interface brief command. What should the output indicate for correctly configured, active interfaces? jika terminal R1 dan R2 telah terkoneksi
f.       View devices from R1’s terminal session using the show cdp neighbors command. If an additional switch is added between PC2 and R2, would that switch appear in this command output? No. Why or why not?
maka perlu ditambahakn perintah
R2(config-if)# interface FastEthernet 0 / 0
R2 (config-if) # ip address PC2(alamat IP addressnya) 255.255.255.0
R2 (config-if) # shutdown tidak
Step 11: Remove Static Route and configure a routing protocol on router R1
Step 12: Remove Static Route and configure a routing protocol on router R2
Step 13: Verify and test the configurations
a.       To verify that PC1 and Switch1 are correctly configured, ping the switch IP address from PC1.
b.      To verify that Switch1 and R1 are correctly configured, ping the router Fa0/0 interface (default gateway) IP address from the Switch1 CLI.
c.       To verify that PC2 and R2 are correctly configured, ping the router Fa0/0 interface from PC2. Were the pings successful?
d.      Verify that the routing tables have routes to all configured networks by using the show ip route command. R2’s routing table should display:
What does the “R” indicate?
On R1, which route would be displayed with an “R”?
jawaban huruf R menunjukkan proses routing yang telah dikonfigurasikan untuk menghubungkan R1 dan R2 pada temapt yang berbeda.
e.       Verify the router interface configurations using the show ip interface brief command.
f.       View devices from R1’s terminal session using the show cdp neighbors command.
Step 14: Use the switch management interface
a.       Open a command prompt on PC1, and enter the telnet command followed by the IP address assigned to management interface VLAN 1.
b.      Enter the vty password configured in Step 2 to gain access to the switch.
c.       At the switch prompt, issue the show version command. Switch1>show version
d.      What is the Cisco IOS version of this switch?
e.       Determine which MAC addresses the switch has learned by using the show mac-address-table command at the privileged EXEC mode prompt.
How can you determine the MAC address belonging to PC1?
dapat dilihat dari table mac address dan lihat computer PC1 .
Does PC1’s MAC address match one in the switch table?  Ya
f.       To allow the switch port FastEthernet 0/1 to accept only one device, configure port security as follows:
g.      Check the port security settings. If a host other than PC1 attempts to connect to Fa0/1, what will happen? akan dimatikan secara otomatis.
h.      Issue the show interfaces command. What is the duplex and speed setting for Fa0/5 now?
i.        Enter quit at the switch command prompt to terminate the Telnet session.
Step 15: Reflection
a.       Describe a situation in which you would use virtual terminal access to manage a switch, as you did in Step 11.
bisa di implementasika pada kantor kecil yang jaraknya dekat atau bersebelahan.
b.      Which symbol is used to show a successful ping in the Cisco IOS software? congratulation
  1. Which commands used in this lab would provide the best documentation for this network? Switch1 # show mac-address-table
d.      This lab gave you an opportunity to review and display your knowledge of configuration commands. If you were asked to state three rules for “best practices” in device configuration, what would they be?
1. Menetukan rute terbaik
2. memilih jenis protocol yang digunakan dan membatasi IP address
3. mendaftarkan MAC address
e.       Erase and reload all devices.

Lab 3.1.4 Applying Basic Switch Security


Step 1: Connect PC1 to the switch
Step 2: Connect PC2 to the switch
Step 3: Configure PC3 but do not connect
Step 4: Perform an initial configuration on the switch
a. Configure the hostname of the switch as Switch1
b.      Set the privileged EXEC mode password to cisco.
c.       Set the privileged EXEC mode secret password to class.
d.      Configure the console and virtual terminal lines to use a password and require it at login.
e.       Exit from the console session and log in again.
Which password was required to enter privileged EXEC mode?
Why?
Step 5: Configure the switch management interface on VLAN 1
a.       Enter the interface configuration mode for VLAN 1.
b.      Set the IP address, subnet mask, and default gateway for the management interface.
Why does interface VLAN 1 require an IP address in this LAN?
What is the purpose of the default gateway?
Step 6: Verify the management LANs settings
a.       Verify that the IP address of the management interface on the switch VLAN 1 and the IP address of PC1 and PC2 are on the same local network. Use the show running-config command to check the IP address configuration of the switch.
b.      Verify the interface settings on VLAN 1.
What is the bandwidth on this interface?
What are the VLAN states?
VLAN 1 is __________ and line protocol is __________.
Step 7: Disable the switch from being an http server
Step 8: Verify connectivity
a.       To verify that hosts and switch are correctly configured, ping the switch IP address from the hosts. Were the pings successful?
If the ping is not successful, verify the connections and configurations again. Check to ensure that all cables are correct and that connections are seated. Check the host and switch configurations.
b.      Save the configuration.
Step 9: Record the host MAC addresses
Determine and record the Layer 2 addresses of the PC network interface cards. From the command prompt of each PC, enter ipconfig /all.
PC1 __________________________________________________
PC2 __________________________________________________
PC3 __________________________________________________
Step 10: Determine what MAC addresses the switch has learned
Determine what MAC addresses the switch has learned by using the show mac-address-tablecommand at the privileged EXEC mode prompt.
How many dynamic addresses are there?
How many total MAC addresses are there?
Do the MAC addresses match the host MAC addresses?
Step 11: View the show mac-address-table options
View the options that the show mac-address-table command has available.
Switch1(config)#show mac-address-table ?
What options are available?
Step 12: Set up a static MAC address
Step 13: Verify the results
a.    Verify the MAC address table entries.
Switch1#show mac-address-table
How many dynamic MAC addresses are there now?
How many static MAC addresses are there now?
b.    Remove the static entry from the MAC Address Table.
Step 14: List port security options
a. Determine the options for setting port security on interface FastEthernet 0/4.
What are some available options?
b. To allow the switch port FastEthernet 0/4 to accept only one device, configure port security.
c. Exit configuration mode and check the port security settings.
If a host other than PC2 attempts to connect to Fa0/4, what will happen?
Step 15: Limit the number of hosts per port
a.       On interface FastEthernet 0/4, set the port security maximum MAC count to 1.
b.      Disconnect the PC attached to FastEthernet 0/4. Connect PC3 to FastEthernet 0/4. PC3 has been given the IP address of 192.168.1.5 and has not yet been attached to the switch. It may be necessary to ping the switch address 192.168.1.2 to generate some traffic. Record any observations. _____________________________________
Step 16: Configure the port to shut down if there is a security violation
a. In the event of a security violation, the interface should be shut down. To make the port security shut down, enter the following command: Switch1(config-if)#switchport port-security violation shutdown
What other action options are available with port security?
b. If necessary, ping the switch address 192.168.1.2 from the PC3 192.168.1.5. This PC is now connected to interface FastEthernet 0/4. This ensures that there is traffic from the PC to the switch.
c. Record any observations. _____________________________________________________________________________
d. Check the port security settings
Step 17: Show port 0/4 configuration information
FastEthernet0/4 is __________ and line protocol is __________.
Step 18: Reactivate the port
Step 19: Disable unused ports
Step 20: Reflection
a.       Why would port security be enabled on a switch?
b.      Why should unused ports on a switch be disabled?

Lab 3.6.5 Sharing Resources


Langkah 1: Share folder
Klik Mulai. dari Menu Start, pilih All Programs, Accessories, dan kemudian Windows Explorer.
Pada panel Folder, klik tanda plus () di samping My Computer. Klik C: drive. Dari File yang
menu. pilih New dan dari sub-menu, pilih opsi Folder. Jenis Saham sebagai nama
folder.
Klik kanan Share folder baru dan pilih Properties. Catatan: Pilihan Berbagi tidak tersedia untuk Documents and Settings, Program Files, dan Windows sistem folder.
Pilih tab Sharing. Pada kotak dialog Properties Share, klik Share this folder tombol radio
berbagi folder dengan pengguna lain pada jaringan Anda. Nama default untuk folder bersama adalah sama nama sebagai nama folder asli. CATATAN: Untuk mengubah nama folder pada jaringan, ketik nama baru untuk folder di Berbagi nama kotak teks. Ini tidak akan mengubah nama folder pada komputer Anda.
Klik Apply dan kemudian OK.
Buat file teks menggunakan Notepad dan simpan ke folder Share. Pada desktop Windows XP, klik Start, pilih All Programs, Accessories, lalu Notepad. Dalam aplikasi Notepad, ketik pesan “Hello World!”. Dari menu File, pilih Simpan. Pada kolom File name, ketik “pesan Test”. Klik ikon dengan folder dan panah atas seperti ditunjukkan pada gambar berikut.
Klik dua kali Komputer Saya, kemudian klik dua kali drive C:. Cari dan klik dua kali folder Share, kemudian klik Simpan.
Tutup aplikasi Notepad.
Ulangi langkah 1 – 5 untuk mesin Windows XP Professional kedua dengan pengecualian berikut:
Share name: Share2 File teks isi: Halo planet! File teks name: Test Message 2
Langkah 2: Peta drive jaringan untuk menyediakan akses cepat dan mudah ke folder shared
Pada workstation XP pertama Windows, klik Start, pilih All Programs, Accessories, dan kemudian Windows Explorer.
Pada panel Folder, klik My Computer. Dari Tools Menu, pilih Map Network Drive ….
Dalam textbox Drive, pilih huruf drive yang tidak terpakai menggunakan menu pulldown.
Pertanyaan: Apa huruf drive yang Anda pilih
Di bidang Folder, ketik alamat IP PC remote dan nama bagian remote menggunakan format: \ \ ip_address \ sharename
Klik Finish. Sebuah jendela akan muncul dengan pesan Mencoba untuk terhubung ke \ \ 192.168.10.3 \ share2. Sebuah jendela akan terbuka untuk menampilkan isi dari folder bersama Share2 disebut yang sekarang sudah diberi huruf drive. CATATAN: Alamat IP dapat digantikan dengan nama komputer.\
Klik dua kali pesan Test 2 dokumen teks. Tambahkan aturan kata-kata teknisi untuk dokumen. Dari menu File dan pilih Simpan. Pertanyaan: Apa pesan yang ditampilkan? Mengapa Anda pikir ini terjadi? Jawaban: Tidak dapat mengakses file ini. Periksa Keistimewaan Keamanan. Pertanyaan kedua adalah pendapat pelajar sendiri
File-file dalam folder bersama secara otomatis dilindungi dalam versi Windows XP Professional. Klik OK di kotak pesan. Klik Batalkan, kemudian klik Tutup untuk pesan Uji 2 dokumen.
Pada kotak pesan, klik No untuk menutup dokumen tanpa menyimpan perubahan.
Ulangi prosedur ae bawah Langkah 2 untuk memetakan drive pada workstation Windows XP kedua. Ini drive harus dipetakan ke bagian Anda dikonfigurasi pada Langkah 1.
Langkah 3: bekerja Verifikasi
Dari mesin XP pertama Windows Professional, klik Start, pilih All Programs, kemudian Aksesoris, dan Windows Explorer.
Expand My Computer dengan mengklik tanda plus () di samping pilihan.
Daftar Windows Explorer akan menampilkan sebuah drive dengan label huruf drive yang Anda pilih untuk remote saham.
Ulangi ac untuk mesin Windows XP Professional kedua prosedur. Jika huruf drive muncul pada kedua komputer, maka folder dibagi dan drive yang dipetakan benar pada kedua Windows XP workstation. Anda dapat melakukan langkah yang sama di folder apapun. Ketika
drive dengan benar dipetakan ke folder bersama, semua file dan folder di dalam folder bersama akan diakses dari workstation.
Langkah 4: Refleksi
Apa saja manfaat dipetakan drive dan folder berbagi di rumah atau kantor kecil
jaringan? Jawaban: menghidari terinfeksi dari virus dan memudahkan mengingat alamat file kita.
Folder yang tidak dapat dibagi? Dapatkah Anda memikirkan alasan mengapa sebuah sistem operasi mungkin tidak mengizinkan jenis tertentu folder yang akan dibagi? Jawaban: mungkin ada konfigurasi yang salah.
Sebuah drive yang dipetakan menyediakan pointer ke sumber daya jaringan, tapi huruf drive yang dipetakan dikatakan signifikan secara lokal saja. Menurut Anda apa yang dimaksud dengan lokal yang signifikan?