Cisco 3.3 User Manual Page 6

  • Download
  • Add to my manuals
  • Print
  • Page
    / 7
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 5
Lab – Implementing VLAN Security
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 7
a. Issue the show interface f0/2 switchport command on S1. Notice the administrative mode and state for
trunking negotiation.
S1# show interface f0/2 switchport
Name: Fa0/2
Switchport: Enabled
Administrative Mode: dynamic auto
Operational Mode: down
Administrative Trunking Encapsulation: dot1q
Negotiation of Trunking: On
<Output Omitted>
b. Disable trunking on S1 access ports.
S1(config)# interface range f0/2 – 5
S1(config-if-range)# switchport mode access
S1(config-if-range)# switchport access vlan 999
c. Disable trunking on S2 access ports.
d. Verify that port F0/2 is set to access on S1.
S1# show interface f0/2 switchport
Name: Fa0/2
Switchport: Enabled
Administrative Mode: static access
Operational Mode: down
Administrative Trunking Encapsulation: dot1q
Negotiation of Trunking: Off
Access Mode VLAN: 999 (BlackHole)
Trunking Native Mode VLAN: 1 (default)
Administrative Native VLAN tagging: enabled
Voice VLAN: none
<Output Omitted>
e. Verify that VLAN port assignments on both switches are correct. S1 is shown below as an example.
S1# show vlan brief
VLAN Name Status Ports
---- ------------------------------ --------- ------------------------------
1 default active Fa0/7, Fa0/8, Fa0/9, Fa0/10
Fa0/11, Fa0/12, Fa0/13, Fa0/14
Fa0/15, Fa0/16, Fa0/17, Fa0/18
Fa0/19, Fa0/20, Fa0/21, Fa0/22
Fa0/23, Fa0/24, Gi0/1, Gi0/2
10 Data active
99 Management&Native active Fa0/6
999 BlackHole active Fa0/2, Fa0/3, Fa0/4, Fa0/5
1002 fddi-default act/unsup
1003 token-ring-default act/unsup
1004 fddinet-default act/unsup
1005 trnet-default act/unsup
Restrict VLANs allowed on trunk ports.
Page view 5
1 2 3 4 5 6 7

Comments to this Manuals

No comments