CCNA Capstone Project

Andrew Aiken | Jun 11, 2025 min read

Overview

This project showcases everything I’ve learned while studying for the CCNA exam.

Each section outlines the steps taken and commands used to configure and verify the features and protocols listed below.

The project is extensive, so I recommend using the Table of Contents for quick navigation.

Naming Conventions

Naming Conventions

AbbreviationMeaning
ISPInternet Service Provider
EREdge Router
CSWCore Switch
DSWDistribution Switch
ASWAccess Switch
PCPersonal Computer
SRVServer

Device Models

Device Models

CategoryModelIOS ImageVersion
RouterC2911C2900-UNIVERSALK9-M15.1(4)M5
L3 SwitchC3650-24PSCAT3K_CAA-UNIVERSALK9-M16.3.2
L2 SwitchC2960-24TTC2960-LANBASEK9-M15.0(2)SE4

Initial Configurations

Hostnames

Hostnames

To configure the hostname for each device I first entered Privilege EXEC mode by issuing the enable command from User EXEC mode.

From Privileged EXEC mode, I entered Global Configuration mode by issuing the configure terminal command.

Finally, from global configuration mode, all devices were configured with hostnames using the hostname x command where x is the hostname.

Here’s the output shown in the terminal when successfully configuring the hostname of ER1:

Router>en
Router#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#hostname ER1
ER1(config)#

Enable Secrets

Enable Secrets

To protect the configurability of each device an enable secret of cisco was set using the enable secret cisco command from global configuration mode.

Here’s the output shown in the terminal when attempting to enter Privileged EXEC mode after setting the enable secret:

ER1>en
Password: 
ER1#

Local User Accounts

Local User Accounts

The local user account aiken with the encrypted password of cisco was created on each device using the username aiken secret cisco command from global configuration mode.

This local user account will later be configured to authenticate remote access attempts via the VTY lines.

Here’s a partial output of the running configuration of ER1 showing the newly configured user account:

!
username aiken secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!

Setting a Domain

Setting a Domain

The domain aiken.com was configured on each device by issuing the ip domain-name aiken.com

This will later be required to configure remote access via SSH.

I also executed the no ip domain-lookup to avoid attempts by the device to resolve typos to ip addresses.

Here’s a partial output of the running configuration of ER1 showing the newly configured settings:

!
no ip domain-lookup
ip domain-name aiken.com
!

Configuring Console Line

Configuring Console Line

To avoid having a command chopped in half in the middle of typing it, I enabled synchronous logging.

First, I went into line configuration mode by executing the line console 0 command from global configuration mode.

Then, I issued the command logging synchronous from line configuration mode.

I also set a 20-minute inactivity timer using the exec-timeout 20 command in line configuration mode.

Here’s a partial output of the running configuration of ER1 showing the Console Line configuration:

!
line con 0
 exec-timeout 20 0
 logging synchronous
!

EtherChannels

Layer-2 EtherChannel (LACP)

Layer-2 EtherChannel (LACP)

After connecting two redundant links between the Distribution Switches, I grouped them into an EtherChannel allowing them to function as a single logical link.

The layer-2 EtherChannel was configured using LACP by issuing the Channel-group 1 mode active command in interface configuration mode.

Here’s the output of the show etherchannel summary command on DSW1 confirming the EtherChannel is L2 and in use.

DSW1#show etherchannel summary
Flags:  D - down        P - in port-channel
        I - stand-alone s - suspended
        H - Hot-standby (LACP only)
        R - Layer3      S - Layer2
        U - in use      f - failed to allocate aggregator
        u - unsuitable for bundling
        w - waiting to be aggregated
        d - default port


Number of channel-groups in use: 1
Number of aggregators:           1

Group  Port-channel  Protocol    Ports
------+-------------+-----------+----------------------------------------------

1      Po1(SU)           LACP   Gig1/0/1(P) Gig1/0/2(P) 

Layer-3 EtherChannel (PAgP)

Layer-3 EtherChannel (PAgP)

Like the layer-2 EtherChannel, two redundant links were connected between the Core Switches and grouped into an EtherChannel allowing them to act as a single logical link.

The layer-3 EtherChannel was configured using PAgP by issuing the Channel-group 1 mode desirable command in interface configuration mode.

Here is the output of the show etherchannel summary command on CSW1 confirming the EtherChannel is L3 and in use.

CSW1(config-if)#do sh eth sum
Flags:  D - down        P - in port-channel
        I - stand-alone s - suspended
        H - Hot-standby (LACP only)
        R - Layer3      S - Layer2
        U - in use      f - failed to allocate aggregator
        u - unsuitable for bundling
        w - waiting to be aggregated
        d - default port


Number of channel-groups in use: 1
Number of aggregators:           1

Group  Port-channel  Protocol    Ports
------+-------------+-----------+----------------------------------------------

1      Po1(RU)           PAgP   Gig1/0/1(P) Gig1/0/2(P)

L3 Routed Interfaces

L3 Routed Interfaces

To create the layer-3 EtherChannel, I enabled ip routing globally on each layer-3 Core Switch using the ip routing command in global configuration mode.

Then, to convert a standard switchport to a routed port, I issued the no switchport command on G1/0/1 and G1/0/2 in interface configuration mode.

Here’s a partial output of the show interfaces status command on CSW1 showing the newly configured routed ports:

CSW1#show interfaces status
Port      Name               Status       Vlan       Duplex  Speed Type
Po1                          connected    routed     auto    auto  
Gig1/0/1                     connected    routed     auto    auto  10/100BaseTX
Gig1/0/2                     connected    routed     auto    auto  10/100BaseTX

VLANs

VLAN IDs

VLAN IDs

There are 4 VLANS configured in this network

  • VLAN 10: Computers
  • VLAN 20: Phones
  • VLAN 30: Servers
  • VLAN 99: Management
VLANName
10Computers
20Phones
30Server
99Management

Each Vlan was created using the Vlan x command in global configuration mode where x is the vlan number.

I then named each VLAN using the name x command in vlan configuration mode where x is the name of the vlan.

Here’s a partial output of the show vlan command verifying the newly configured VLANs on DSW1:

DSW1(config)#do show vlan

VLAN Name                             Status    Ports
---- -------------------------------- --------- -------------------------------
10   Computers                        active    
20   Phones                           active    
30   Servers                          active    
99   Management                       active  

VTP VLAN Propagation

VTP VLAN Propagation

Once the VLANs were successfully created on DSW1 I propagated them to all other Distribution and Access Switches.

This was done by first configuring each Switch to use aiken.com as the VTP domain by issuing the VTP domain aiken.com command from global configuration mode.

Then, I configured DSW1 as a VTP server by issuing the VTP mode server command from global configuration mode.

The remaining switches were configured as VTP clients using the VTP mode client command from global configuration mode.

Here’s the output of the show VTP status command on DSW1:

DSW1#show vtp status 
VTP Version capable             : 1 to 2
VTP version running             : 2
VTP Domain Name                 : aiken.com
VTP Pruning Mode                : Disabled
VTP Traps Generation            : Disabled
Device ID                       : 0001.4251.50C0
Configuration last modified by 0.0.0.0 at 3-1-93 00:21:14
Local updater ID is 0.0.0.0 (no valid interface found)

Feature VLAN : 
--------------
VTP Operating Mode                : Server
Maximum VLANs supported locally   : 1005
Number of existing VLANs          : 9
Configuration Revision            : 13

Note: After the VLANs successfully propagated, all switches were placed into VTP transparent mode using the VTP mode transparent command for security.


Trunk Port Configuration

Trunk Port Configuration

All links between Distribution and Access Switches were manually configured as 802.1q trunks using the switchport mode trunk command from interface configuration mode.

Each trunk was configured to only allow the 4 specific VLANs (listed in the VLAN IDs section) using the switchport trunk allowed vlan command from interface configuration mode.

Each trunks native VLAN was then set to VLAN 1000, an unused vlan for security, using the switchport trunk native vlan command from interface configuration mode.

Here’s the output of the show interfaces trunk command on DSW1 verifying the configurations:

DSW1(config-if)#do sh int trunk
Port        Mode         Encapsulation  Status        Native vlan
Po1         on           802.1q         trunking      1000
Gig1/0/3    on           802.1q         trunking      1000
Gig1/0/4    on           802.1q         trunking      1000
Gig1/0/5    on           802.1q         trunking      1000

Port        Vlans allowed on trunk
Po1         10,20,30,99
Gig1/0/3    10,20,30,99
Gig1/0/4    10,20,30,99
Gig1/0/5    10,20,30,99

Port        Vlans allowed and active in management domain
Po1         10,20,30,99
Gig1/0/3    10,20,30,99
Gig1/0/4    10,20,30,99
Gig1/0/5    10,20,30,99

Port        Vlans in spanning tree forwarding state and not pruned
Po1         10,20,30,99
Gig1/0/3    10,20,30,99
Gig1/0/4    10,20,30,99
Gig1/0/5    10,20,30,99

Access Port Configuration

Access Port Configuration

All Access Switch switchports connected to end hosts were first configured as access ports using the switchport mode access command in interface configuration mode.

Each interface was configured to access the appropriate VLAN using the switchport access vlan x command, where x is the vlan number.

Here’s a partial output of the running configuration on ASW1 showing the access port configurations for Fa0/1 and Fa0/2:

!
interface FastEthernet0/1
 switchport access vlan 10
 switchport mode access
!
interface FastEthernet0/2
 switchport access vlan 10
 switchport mode access
!

Voice VLAN

Voice VLAN

ASW3’s Fa0/1 interface is connected to IP Phone 1, and PC3 is connected to the switchport on IP Phone 1.

To allow tagged traffic from both VLANs 10 and 20 on Fa0/1 without configuring it as a trunk port, the switchport voice vlan 20 command was executed in interface configuration mode.

Here’s Fa0/1's interface configuration as shown in the running configuration on ASW3:

interface FastEthernet0/1
 switchport access vlan 10
 switchport voice vlan 20

Additionally, here’s a partial output of the show vlan command on ASW3:

ASW3#show vlan

VLAN Name                             Status    Ports
---- -------------------------------- --------- -------------------------------
10   Computers                        active    Fa0/1
20   Phones                           active    Fa0/1

Securing Unused Switchports

Securing Unused Switchports

The remaining unused Distribution and Access Switch ports were manually configured as access ports (to disable DTP) and administratively disabled using the shutdown command for security.

Here’s the output of the show interfaces status command on ASW1:

ASW1(config-if)#do sh int st
Port      Name               Status       Vlan       Duplex  Speed Type
Fa0/1                        connected    10         auto    auto  10/100BaseTX
Fa0/2                        connected    10         auto    auto  10/100BaseTX
Fa0/3                        disabled     1          auto    auto  10/100BaseTX
Fa0/4                        disabled     1          auto    auto  10/100BaseTX
Fa0/5                        disabled     1          auto    auto  10/100BaseTX
Fa0/6                        disabled     1          auto    auto  10/100BaseTX
Fa0/7                        disabled     1          auto    auto  10/100BaseTX
Fa0/8                        disabled     1          auto    auto  10/100BaseTX
Fa0/9                        disabled     1          auto    auto  10/100BaseTX
Fa0/10                       disabled     1          auto    auto  10/100BaseTX
Fa0/11                       disabled     1          auto    auto  10/100BaseTX
Fa0/12                       disabled     1          auto    auto  10/100BaseTX
Fa0/13                       disabled     1          auto    auto  10/100BaseTX
Fa0/14                       disabled     1          auto    auto  10/100BaseTX
Fa0/15                       disabled     1          auto    auto  10/100BaseTX
Fa0/16                       disabled     1          auto    auto  10/100BaseTX
Fa0/17                       disabled     1          auto    auto  10/100BaseTX
Fa0/18                       disabled     1          auto    auto  10/100BaseTX
Fa0/19                       disabled     1          auto    auto  10/100BaseTX
Fa0/20                       disabled     1          auto    auto  10/100BaseTX
Fa0/21                       disabled     1          auto    auto  10/100BaseTX
Fa0/22                       disabled     1          auto    auto  10/100BaseTX
Fa0/23                       disabled     1          auto    auto  10/100BaseTX
Fa0/24                       disabled     1          auto    auto  10/100BaseTX
Gig0/1                       connected    trunk      auto    auto  10/100BaseTX
Gig0/2                       connected    trunk      auto    auto  10/100BaseTX

Inter-VLAN Routing with SVIs

Inter-VLAN Routing with SVIs

To route VLAN traffic, SVIs for each VLAN were created on each Distribution Switch using the interface vlan x command from global configuration mode.

For DSW1, each SVI is configured with the second usable IP address in the subnet and DSW2’s SVIs are configured with the third usable IP address.

This leaves the first usable address in the range to be used as the virtual IP when configuring HSRP groups (see the HSRPv2 section for more information).

Here’s a partial output of the show ip interface brief command on DSW1 confirming the SVI’s IP assignments:

DSW1#show ip int br
Interface              IP-Address      OK? Method Status                Protocol 
Vlan1                  unassigned      YES unset  administratively down down 
Vlan10                 10.0.10.2       YES manual up                    up 
Vlan20                 10.0.20.2       YES manual up                    up 
Vlan30                 10.0.30.2       YES manual up                    up 
Vlan99                 10.0.99.2       YES manual up                    up

Rapid-PVST+

Enabling RPVST+

Enabling RPVST+

To prevent layer-2 loops in the network, Rapid PVST+ was enabled on all Distribution and Access Switches using the spanning-tree mode rapid-pvst command.

Note that STP is not operating north of the Distribution layer by design.

In the Core layer, scalability, speed, and resiliency are prioritized. Therefore layer-3 dynamic routing is employed as it scales better, re-converges faster, and doesn’t block ports like STP.


Configuring the Root Bridge

Configuring the Root Bridge

We can manipulating the root bridge election and force network traffic to take a predicable path through the network.

Also, by electing a different root bridge for each VLAN we can load-balance network traffic across different links.

However, in this project I selected DSW1 and DSW2 to be the primary and secondary root bridges for all VLANs by adjusting their STP priorities.

I made DSW1 the primary root bridge for each VLAN using the spanning-tree vlan 1-100 priority 0 command from global configuration mode.

Additionally, I made DSW2 the secondary root bridge for each VLAN using the spanning-tree vlan 1-100 priority 4096 command from global configuration mode.

Here’s the output of the show spanning-tree vlan 10 command on DSW1:

DSW1(config)#do show span vlan 10
VLAN0010
  Spanning tree enabled protocol rstp
  Root ID    Priority    10
             Address     0001.43E7.9398
             This bridge is the root
             Hello Time  2 sec  Max Age 20 sec  Forward Delay 15 sec

  Bridge ID  Priority    10  (priority 0 sys-id-ext 10)
             Address     0001.43E7.9398
             Hello Time  2 sec  Max Age 20 sec  Forward Delay 15 sec
             Aging Time  20

Interface        Role Sts Cost      Prio.Nbr Type
---------------- ---- --- --------- -------- --------------------------------
Gi1/0/1          Desg FWD 4         128.1    P2p
Gi1/0/3          Desg FWD 4         128.3    P2p
Gi1/0/2          Desg FWD 4         128.2    P2p
Gi1/0/5          Desg FWD 4         128.5    P2p
Gi1/0/4          Desg FWD 4         128.4    P2p
Po1              Desg FWD 3         128.29   Shr

Portfast & BPDU Guard

Portfast & BPDUGuard

To allow access ports to bypass the learning state and immediately transition to the forwarding state I configured Portfast.

Portfast was enabled globally on all Access Switch access ports by issuing the spanning-tree portfast default command in global configuration mode.

To protect the network from unintended topology changes, I also configured BPDUGuard. This will err-disable access ports that receive BPDUs.

BPDUGuard was enabled globally on all Portfast enabled ports by issuing the spanning-tree portfast bpduguard default command in global configuration mode.

Here we can see Portfast and BPDUGuard are enabled in the output of the show spanning-tree summary command on ASW1:

ASW1(config)#do sho span sum
Switch is in rapid-pvst mode
Root bridge for:
Extended system ID           is enabled
Portfast Default             is enabled
PortFast BPDU Guard Default  is enabled
Portfast BPDU Filter Default is disabled
Loopguard Default            is disabled
EtherChannel misconfig guard is disabled
UplinkFast                   is disabled
BackboneFast                 is disabled
Configured Pathcost method used is short

Name                   Blocking Listening Learning Forwarding STP Active
---------------------- -------- --------- -------- ---------- ----------
VLAN0001                     3         0        0          1          4
VLAN0010                     1         0        0          3          4
VLAN0020                     4         0        0          0          4
VLAN0030                     3         0        0          1          4
VLAN0099                     3         0        0          1          4

---------------------- -------- --------- -------- ---------- ----------
5 vlans                     14         0        0          6         20

Triggering BPDUGuard

Triggering BPDUGuard

To trigger BPDUGuard, I connected a new switch to the access port Fa0/4 on ASW1.

Here we can see Fa0/4 enter the err-disabled state after it receives a BPDU from the new switch:

ASW1(config)#int f0/4
ASW1(config-if)#no shut

ASW1(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/4, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/4, changed state to up

ASW1(config-if)#%SPANTREE-2-BLOCK_BPDUGUARD: Received BPDU on port FastEthernet0/4 with BPDU Guard enabled. Disabling port.

%PM-4-ERR_DISABLE: bpduguard error detected on 0/4, putting 0/4 in err-disable state

Additionally, here’s a partial output of the show interface Fa0/4 command on ASW1

ASW1#show int fa0/4
FastEthernet0/4 is down, line protocol is down (err-disabled)

There are a few options to re-enable an err-disabled interface.

We can administratively down-and-up the port manually or we can configure err-disable recovery.

Unfortunately, Packet Tracer’s emulated devices and images do not support err-disable recovery (as far as I can tell) so we are left with the manual option.


IP Addressing

Addressing Overview
Point-to-Point Networks

Point-to-Point Networks

All links between the ISP and Edge Routers, and Core and Distribution Switches are layer-3 Point-to-Point /30 networks.

IP addresses were configured on each interface using the ip address 10.x.x.x 255.255.255.252 command from interface configuration mode.


ISP-to-Edge Subnets

ISP-to-Edge Subnets

The IP addressing for the networks configured between the ISP and Edge Routers is as follows:

NetworkDeviceInterfaceIP Address
81.220.16.32/30ISP1G0/081.220.16.33
81.220.16.32/30ER1G0/081.220.16.34
203.0.113.0/30ISP2G0/0203.0.113.1
203.0.113.0/30ER2G0/0203.0.113.2

Edge-to-Core Subnets

Edge-to-Core Subnets

The IP addressing for the networks configured between the Edge Routers and Core Switches is as follows:

NetworkDeviceInterfaceIP Address
10.0.0.0/30ER1G0/0/010.0.0.1
10.0.0.0/30ER2G0/0/010.0.0.2
10.1.1.0/30ER1G0/110.1.1.1
10.1.1.0/30CSW1G1/0/510.1.1.2
10.1.1.4/30ER1G0/210.1.1.5
10.1.1.4/30CSW2G1/0/510.1.1.6
10.1.1.8/30ER2G0/110.1.1.9
10.1.1.8/30CSW1G1/0/610.1.1.10
10.1.1.12/30ER2G0/210.1.1.13
10.1.1.12/30CSW2G1/0/610.1.1.14

Core-to-Distribution Subnets

Core-to-Distribution Subnets

The IP addressing for the networks configured between the Core Switches and Distribution Switches is as follows:

NetworkDeviceInterfaceIP Address
10.2.2.16/30CSW1Po110.2.2.17
10.2.2.16/30CSW2Po110.2.2.18
10.2.2.20/30CSW1G1/0/310.2.2.21
10.2.2.20/30DSW1G1/0/610.2.2.22
10.2.2.24/30CSW1G1/0/410.2.2.25
10.2.2.24/30DSW2G1/0/610.2.2.26
10.2.2.28/30CSW2G1/0/310.2.2.29
10.2.2.28/30DSW1G1/0/710.2.2.30
10.2.2.32/30CSW2G1/0/410.2.2.33
10.2.2.32/30DSW2G1/0/710.2.2.34

VLAN Subnets

VLAN Subnets

The IP addressing for each VLAN is as follows:

VLANNetworkDefault Gateway
1010.0.10.0/2410.0.10.1
2010.0.20.0/2410.0.20.1
3010.0.30.0/2410.0.30.1
9910.0.99.0/2810.0.99.1

Loopback Interface Addressing

Loopback Interface Addressing

To provide a stable interface that remains up and doesn’t rely on hardware, I configured loopback interfaces on all layer-3 devices.

Each ISP Router is configured with the loopback address 8.8.8.8/32 which will be used to simulate and test internet connectivity from the LAN.

Each Edge Router, Core, and Distribution Switch’s loopback interfaces have been configured with an address from the 10.255.0.0/29 block.

Loopback interfaces were created by issuing the interface loopback 0 command from global configuration mode

Each Loopback interface was assigned an IP address by issuing the ip address 10.255.0.x 255.255.255.255 command from loopback interface configuration mode.

The loopback IP assignments are as follows:

DeviceInterfaceIP Address
ISP1Loopback 08.8.8.8/32
ISP2Loopback 08.8.8.8/32
ER1Loopback 010.255.0.1/32
ER2Loopback 010.255.0.2/32
CSW1Loopback 010.255.0.3/32
CSW2Loopback 010.255.0.4/32
DSW1Loopback 010.255.0.5/32
DSW2Loopback 010.255.0.6/32

Access Switch Addressing

Access Switch Addressing

For remote management purposes, each Access Switch’s VLAN 99 (Management) interface is configured with an IP address from the 10.0.99.0/28 network.

The default gateway of 10.0.99.1 was configured on each Access Switch using the ip default-gateway 10.0.99.1 command from global configuration mode.

The IP addressing for Access Switches VLAN 99 Interfaces is as follows:

DeviceInterfaceIP AddressDefault Gateway
ASW1VLAN 9910.0.99.4/2810.0.99.1
ASW2VLAN 9910.0.99.5/2810.0.99.1
ASW3VLAN 9910.0.99.6/2810.0.99.1

Here’s a partial output of the running configuration on ASW1 verifying the default gateway and IP address configurations:

!
interface Vlan99
 ip address 10.0.99.4 255.255.255.240
!
ip default-gateway 10.0.99.1
!

HSRPv2

Enabling HSRPv2

Enabling HSRPv2

For gateway redundancy, the Distribution Switches SVI interfaces are paired into HSRP groups.

I enabled HSRPv2 for each SVI by issuing the standby version 2 command in vlan interface configuration mode.


Virtual Gateway IP

Virtual Gateway IP

This virtual IP address of each group will act as the default gateway for each VLAN and will be advertised to clients via DHCP (See DHCP section for more information).

I configured the virtual IP to be the first usable IP address in the subnet using the standby x ip x.x.x.x where x is the group number and x.x.x.x is the virtual IP address.


Priority & Preemption

Adjusting Priority

To make DSW1 the active router in each group I increased its priority to 105 using the standby x priority 105 command in interface configuration mode, where x is the group number.

I also enabled preemption for each group on DSW1 to ensure it is always the active router by issuing the standby x preempt command in interface configuration mode, where x is the group number.


Verifying HSRP Configuration

Verifying HSRP Configuration

Here is the output of the show standby brief command on DSW1 verifying the virtual IP assignments and priority adjustments configured above:

DSW1#show standby brief 
                     P indicates configured to preempt.
                     |
Interface   Grp  Pri P State    Active          Standby         Virtual IP
Vl10        10   105 P Active   local           10.0.10.2       10.0.10.1      
Vl20        20   105 P Active   local           10.0.20.2       10.0.20.1      
Vl30        30   105 P Active   local           10.0.30.2       10.0.30.1      
Vl99        99   105 P Active   local           10.0.99.2       10.0.99.1 

OSPF & Static Routes

Single Area OSPF

Single Area OSPF

Dynamic routing protocols allow us to propagate network routes to neighboring devices, saving us the hassle of manual static configuration.

In this network, Single area OSPF (area 0) is enabled on each Edge Router, Core, and Distribution Switch using the router OSPF 1 command from global configuration mode.


Network Commands

Network Commands

From router configuration mode, each interface was activated using the most specific network x.x.x.x y.y.y.y area 0 commands, where x.x.x.x is the network address and y.y.y.y is the exact wildcard mask.

Here’s a partial output of the running configuration on CSW1 which displays the network commands issued from router configuration mode:

router ospf 1
 network 10.2.2.16 0.0.0.3 area 0
 network 10.2.2.20 0.0.0.3 area 0
 network 10.2.2.24 0.0.0.3 area 0
 network 10.1.1.0 0.0.0.3 area 0
 network 10.1.1.8 0.0.0.3 area 0
 network 10.255.0.3 0.0.0.0 area 0

Passive-Interfaces

Passive-Interfaces

To reduce unnecessary OSPF traffic all loopback interfaces were configured as passive using the passive-interface loopback 0 command from router configuration mode.

Additionally, all Distribution Switch interfaces connected to Access Switches have been configured as passive.

Here’s a partial output of the show ip protocols command on DSW1 showing the passive interface configurations:

DSW1(config-router)#do show ip protocols

Routing Protocol is "ospf 1"
  Passive Interface(s): 
    GigabitEthernet1/0/3
    GigabitEthernet1/0/4
    GigabitEthernet1/0/5
    Loopback0

Router-IDs

Router-IDs

Each device’s OSPF router-ID is manually configured to match the loopback interface IP using the router-id command from router configuration mode.

Note that with the absence of a manually configured router-ID, OSPF would have used the loopback interface address as its router-ID by default.

Here’s a partial output of the show ip protocols command on ER1 showing the Router-ID configurations:

ER1(config-if)#do show ip protocols

Routing Protocol is "ospf 1"
  Routing Information Sources:  
    Gateway         Distance      Last Update 
    10.255.0.1           110      00:16:07
    10.255.0.2           110      00:16:08
    10.255.0.3           110      00:15:33
    10.255.0.4           110      00:15:33
    10.255.0.5           110      00:02:46
    10.255.0.6           110      00:02:46
  Distance: (default is 110)

Point-to-Point Network Type

Point-to-Point Network Type

Later during the project I chose to disable DR/BDR elections and further reduce OSPF overhead traffic by configuring all OSPF enabled interfaces to use the Point-to-Point OSPF network type (instead of the default Broadcast network type).

This was configured by issuing the ip ospf network point-to-point command from interface configuration mode.

The layer-3 EtherChannel between the Core Switches was left using the default Broadcast network type. This is due to known issues associated with EtherChannels and the P2P OSPF network type.

Here’s the output of the show ip ospf interface brief command on CSW1:

CSW1#show ip ospf interface brief 
Interface     PID   Area                     IP Address/Mask          Cost  State  Nbrs F/C
Lo0             1   0                     10.255.0.3/255.255.255.255   1     WAIT  0/0
Gig1/0/6        1   0                      10.1.1.10/255.255.255.252   1    POINT  0/0
Gig1/0/4        1   0                      10.2.2.25/255.255.255.252   1    POINT  0/0
Gig1/0/5        1   0                       10.1.1.2/255.255.255.252   1    POINT  0/0
Gig1/0/3        1   0                      10.2.2.21/255.255.255.252   1    POINT  0/0
Po1             1   0                      10.2.2.17/255.255.255.252   1      BDR  0/0

Default Static Routes

Default Static Routes

A defualt static route for ISP1 is configured on ER1 and a default static route for ISP2 is configured on ER2 using the ip route 0.0.0.0 0.0.0.0 x.x.x.x where x.x.x.x is the next hop IP address.

These default static routes will cause the Edge routers to route all traffic that doesn’t match a known route in the routing table to the ISP Routers.


Floating Static Routes

Floating Static Routes

In case the default static routes pointing from the Edge Routers to the ISP routers fail, the Edge Routers are configured with a backup, floating static route pointing to the neighboring Edge Router.

More specifically, a floating static route pointing to ER2 is configured on ER1 and vise-versa using the ip route 0.0.0.0 0.0.0.0 x.x.x.x 10 where x.x.x.x is the IP address of the other Edge Router and 10 is the administrative distance.

This ensures that if either Edge Routers WAN interface goes down, and the primary default route is removed from the routing table, the floating static route will be inserted into the routing table and will route all traffic destined for an unkown network to the neighboring Edge Router. The neighboring edge router will then route that traffice to the ISP Router using its default static route.

Here’s a simulated failover example of ER1 replacing its default route with the floating static route after shutting down ER1’s g0/0 WAN interface (the interface connected to ISPR1):

ER1(config)#ip route 0.0.0.0 0.0.0.0 10.0.0.2 10
ER1(config)#int g0/0
ER1(config-if)#shut
ER1(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet0/0, changed state to administratively down

%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0, changed state to down

ER1(config-if)#do sh ip route

Gateway of last resort is 10.0.0.2 to network 0.0.0.0

ER1(config-if)#do ping 8.8.8.8

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 8.8.8.8, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms

Propagating The Default Route

Propagating The Default Route

I used the Default Information Originate command on both ER1 and ER2 to propagate their default routes through the network.

Though this allows for equal-cost load balancing of all internet-bound traffic from the LAN, it is not an intelligent failover solution.

If one ISP goes down but the Edge Router’s WAN interface stays up, OSPF has no way of knowing. It will continue to advertise the default route, and traffic will begin to flow into a black hole.

A more intelligent solution would be to configure IP SLA and tracking on each Edge Router to monitor the reachablility to and from the internet. This would allow failover even if the link between the Edge Router and ISP Router remained up.

However, this is outside of the scope of the CCNA and is not supported in Packet Tracer.


Verifying OSPF Configurations

Verifying OSPF Configurations

Using the show ip route command on ER1, we can see OSPF has completely populated the routing table successfully:

ER1#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
       i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
       * - candidate default, U - per-user static route, o - ODR
       P - periodic downloaded static route

Gateway of last resort is 81.220.16.33 to network 0.0.0.0

     10.0.0.0/8 is variably subnetted, 23 subnets, 3 masks
C       10.0.0.0/30 is directly connected, GigabitEthernet0/0/0
L       10.0.0.1/32 is directly connected, GigabitEthernet0/0/0
O       10.0.10.0/24 [110/3] via 10.1.1.2, 00:12:59, GigabitEthernet0/1
                     [110/3] via 10.1.1.6, 00:12:59, GigabitEthernet0/2
O       10.0.20.0/24 [110/3] via 10.1.1.2, 00:12:59, GigabitEthernet0/1
                     [110/3] via 10.1.1.6, 00:12:59, GigabitEthernet0/2
O       10.0.30.0/24 [110/3] via 10.1.1.2, 00:13:09, GigabitEthernet0/1
                     [110/3] via 10.1.1.6, 00:13:09, GigabitEthernet0/2
O       10.0.99.0/24 [110/3] via 10.1.1.2, 00:13:09, GigabitEthernet0/1
                     [110/3] via 10.1.1.6, 00:13:09, GigabitEthernet0/2
C       10.1.1.0/30 is directly connected, GigabitEthernet0/1
L       10.1.1.1/32 is directly connected, GigabitEthernet0/1
C       10.1.1.4/30 is directly connected, GigabitEthernet0/2
L       10.1.1.5/32 is directly connected, GigabitEthernet0/2
O       10.1.1.8/30 [110/2] via 10.1.1.2, 00:13:34, GigabitEthernet0/1
                    [110/2] via 10.0.0.2, 00:13:34, GigabitEthernet0/0/0
O       10.1.1.12/30 [110/2] via 10.1.1.6, 00:13:34, GigabitEthernet0/2
                     [110/2] via 10.0.0.2, 00:13:34, GigabitEthernet0/0/0
O       10.2.2.16/30 [110/2] via 10.1.1.2, 00:13:09, GigabitEthernet0/1
                     [110/2] via 10.1.1.6, 00:13:09, GigabitEthernet0/2
O       10.2.2.20/30 [110/2] via 10.1.1.2, 00:13:34, GigabitEthernet0/1
O       10.2.2.24/30 [110/2] via 10.1.1.2, 00:13:34, GigabitEthernet0/1
O       10.2.2.28/30 [110/2] via 10.1.1.6, 00:13:34, GigabitEthernet0/2
O       10.2.2.32/30 [110/2] via 10.1.1.6, 00:13:34, GigabitEthernet0/2
C       10.255.0.1/32 is directly connected, Loopback0
O       10.255.0.2/32 [110/2] via 10.0.0.2, 00:13:34, GigabitEthernet0/0/0
O       10.255.0.3/32 [110/2] via 10.1.1.2, 00:13:34, GigabitEthernet0/1
O       10.255.0.4/32 [110/2] via 10.1.1.6, 00:13:34, GigabitEthernet0/2
O       10.255.0.5/32 [110/3] via 10.1.1.2, 00:13:34, GigabitEthernet0/1
                      [110/3] via 10.1.1.6, 00:13:34, GigabitEthernet0/2
O       10.255.0.6/32 [110/3] via 10.1.1.2, 00:13:34, GigabitEthernet0/1
                      [110/3] via 10.1.1.6, 00:13:34, GigabitEthernet0/2
     81.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C       81.220.16.32/30 is directly connected, GigabitEthernet0/0
L       81.220.16.34/32 is directly connected, GigabitEthernet0/0
S*   0.0.0.0/0 [1/0] via 81.220.16.33

DHCP

Selecting the DHCP Server

Selecting the DHCP Server

For the purposes of showcasing my CCNA skills, ER1 is configured as the centralized DHCP server for the network.


Address Exclusions

Address Exclusions

The first 10 addresses of each network were excluded from the lease pool using the ip dhcp excluded-address x.x.x.x y.y.y.y command from global configuration mode. Where x.x.x.x is the low address in the exclusion range and y.y.y.y is the high address.

Here’s the output from the running configuration on ER1:

!
ip dhcp excluded-address 10.0.10.1 10.0.10.10
ip dhcp excluded-address 10.0.20.1 10.0.20.10
ip dhcp excluded-address 10.0.30.1 10.0.30.10
ip dhcp excluded-address 10.0.99.1 10.0.99.10
!

DHCP Pools

Configuring DHCP Pools

DHCP pools for each VLAN’s /24 network were created using the ip dhcp pool x command, where x is the name of the pool.

The network for each pool was defined using the network x.x.x.x y.y.y.y command where x.x.x.x is the network address and y.y.y.y is the subnet mask.

The default gateway for each pool is the first usable IP of each VLAN’s subnet which is the Virtual IP of each HSRP group. The default router for each pool was configured using the default-router x.x.x.x command from dhcp configuration mode.

The DNS server for each pool was configured using the dns-server 10.0.30.5 command from dhcp configuration mode.

The domain name for each pool was configured using the domain-name aiken.com command from dhcp configuration mode.

Here’s the configuration of DHCP pools as shown in the running configuration on ER1:

!
ip dhcp pool vlan10
 network 10.0.10.0 255.255.255.0
 default-router 10.0.10.1
 dns-server 10.0.30.5
 domain-name aiken.com
ip dhcp pool vlan20
 network 10.0.20.0 255.255.255.0
 default-router 10.0.20.1
 dns-server 10.0.30.5
 domain-name aiken.com
ip dhcp pool vlan30
 network 10.0.30.0 255.255.255.0
 default-router 10.0.30.1
 dns-server 10.0.30.5
 domain-name aiken.com
!

DHCP Relay

DHCP Relay

Each Distribution Switch’s SVI interface is configured with ip helper-address 10.255.0.1 command from interface configuration mode. 10.255.0.1 is the loopback address of ER1.

This will allow the Distribution Switches to relay DHCP Discover messages to ER1, the DHCP server, which is on a different network.

Here is the DHCP Helper-address configuration shown in the running configuration on DSW1:

!
interface Vlan10
 mac-address 0001.43e7.9301
 ip address 10.0.10.2 255.255.255.0
 ip helper-address 10.255.0.1
 standby version 2
 standby 10 ip 10.0.10.1
 standby 10 priority 105
 standby 10 preempt
!

Verifying DHCP Services

Verifying DHCP Services

Here we can see PC1 successfully recieving an IP configuration from the DHCP server after issuing the ipconfig /renew command in the command prompt:

C:\>ipconfig /renew

   IP Address......................: 10.0.10.11
   Subnet Mask.....................: 255.255.255.0
   Default Gateway.................: 10.0.10.1
   DNS Server......................: 10.0.30.5

DNS

Selecting the DNS Sever

Selecting the DNS Server

SRV1 is configured as the DNS server for this network and has been statically assigned the IP address of 10.0.30.5 with a mask of 255.255.255.0.


A-records

A-records

I entered a single A-record for google.com at 8.8.8.8 for testing name resolution.


Verifying DNS Services

Verifying DNS Services

Here we can see PC2 successfully use the DNS server to resolve google.com to 8.8.8.8:

C:\>ping google.com

Pinging 8.8.8.8 with 32 bytes of data:

Request timed out.
Reply from 8.8.8.8: bytes=32 time<1ms TTL=252
Reply from 8.8.8.8: bytes=32 time<1ms TTL=252
Reply from 8.8.8.8: bytes=32 time<1ms TTL=252

Ping statistics for 8.8.8.8:
    Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
    Minimum = 0ms, Maximum = 0ms, Average = 0ms

NTP

Setting Date & Time

Setting Date & Time

I set the date and time on ER1 using the clock set 05:35:00 June 16 2025 command from priviledge EXEC mode.

To update the hardware clock of the devices I executed the ntp update-calendar command from global configuration mode.

Here’s the output of the show clock command on ER1

ER1#show clock
05:35:37.203 EST Mon Jun 16 2025

Configuring NTP Servers

Configuring NTP Servers

I configured ER1 as an NTP server using the ntp master 5 command from global configuration mode. Where 5 is the stratum.


NTP Authentication

NTP Authentication

For security, I configured NTP authentication.

First, I enabled it with the ntp authentication command from global configuration mode.

Then, I created the NTP authentication key with the ntp authentication-key 1 md5 cisco command, where cisco is the key.

Finally, I enabled the key with ntp trusted-key 1


Configuring NTP Clients

Configuring NTP Clients

I configured all remaining Core, Distribution and Access Switches as NTP clients.

I created the cisco authentication key (as mentioned in the NTP Authentication section) and specified ER1’s loopback address as the NTP server using the ntp server 10.255.0.1 key 1 command from global configuration mode.


Verifying NTP Configuration

Verifying NTP Configuration

Here is the output of the NTP configuration in the running configuration on CSW1:

!
ntp authentication-key 1 md5 0822455D0A16 7
ntp authenticate
ntp trusted-key 1
ntp server 10.255.0.1 key 1
!

Additionally, here is the output of the show ntp associations command on CSW1:

CSW1#show ntp associations

address         ref clock       st   when     poll    reach  delay          offset            disp
 ~10.255.0.1    .STEP.          16   1.74997e+0964      0      0.00           0.00              0.48
*~10.1.1.1      127.127.1.1     5    9        16      377    0.00           2.00              0.12
 * sys.peer, # selected, + candidate, - outlyer, x falseticker, ~ configured

NAT & PAT

Configuring an Extended ACL

Configuring an Extended ACL

To specify which addresses should be translated, an extended access-list named pat has been configured using the ip access-list extended pat command from global configuration mode on ER1.

Permit Access List Entries for each /24 VLAN network were created using the permit ip x.x.x.x y.y.y.y any command from named access list configuration mode. Where x.x.x.x is the source ip and y.y.y.y is the wildcard mask. The word any at the end of the command specifies any destination.

Here is the pat access list configuration as shown in the running configuration on ER1:

!
ip access-list extended pat
 permit ip 10.0.10.0 0.0.0.255 any
 permit ip 10.0.20.0 0.0.0.255 any
 permit ip 10.0.30.0 0.0.0.255 any
!

Inside & Outside Interfaces

Inside & Outside Interfaces

Interface G0/0 was configured with the ip nat outside command from interface configuration mode.

Interfaces G0/1 and G0/2 were configured with the ip nat inside command from interface configuration mode.


Enabling PAT

Enabling PAT

Finally, NAT Overload (PAT) was enabled by executing the ip nat inside source list pat interface GigabitEthernet0/0 overload command from global configuration mode.


Verifying PAT Configuration

Verifying PAT Configuration

After pinging 8.8.8.8 from PC2, here is the output of the show ip nat translations command on ER1:

ER1#show ip nat translations
Pro  Inside global     Inside local       Outside local      Outside global
icmp 81.220.16.34:10   10.0.10.14:10      8.8.8.8:10         8.8.8.8:10

CDP & LLDP

Enabling CDP & LLDP

Enabling CDP & LLDP

Both CDP and LLDP are enabled globally on each Edge Router, Core, Distribution, and Access Switch using the cdp run and lldp run commands from global configuration mode.


Identifying Devices

Identifying Devices

CDP operates at layer 2, making it useful for identifying which devices are connected to which interfaces when configuring IP addressing.

Here is the output of the show cdp neighbors command on DSW1:

DSW1#show cdp neighbors 
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
                  S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone
Device ID    Local Intrfce   Holdtme    Capability   Platform    Port ID
CSW1         Gig 1/0/6        166                    3650        Gig 1/0/3
CSW2         Gig 1/0/7        159                    3650        Gig 1/0/3
ASW2         Gig 1/0/4        84             S       2960        Gig 0/1
ASW3         Gig 1/0/5        146            S       2960        Gig 0/1
ASW1         Gig 1/0/3        144            S       2960        Gig 0/1

Verifying CDP & LLDP Configurations

Verifying CDP & LLDP Configurations

Here, on CSW1, we can see CDP is enabled globally in the output of the show cdp command.

CSW1#show cdp
Global CDP information:
    Sending CDP packets every 60 seconds
    Sending a holdtime value of 180 seconds
    Sending CDPv2 advertisements is enabled

Additionally, we can see the same for LLDP in the output of the show lldp command.

CSW1#show lldp
Global LLDP Information:
    Status: ACTIVE
    LLDP advertisements are sent every 30 seconds
    LLDP hold time advertised is 120 seconds
    LLDP interface reinitialisation delay is 2 seconds

DHCP Snooping

Enabling DHCP Snooping

Enabling DHCP Snooping

DHCP Snooping is enabled for VLANS 1-1000 on all access switches using the ip dhcp snooping vlan 1-1000 from global configuration mode.


Trusted Interfaces

Trusted Interfaces

The interfaces on each Access Switch connected to a Distribution Switch have been configured as trusted ports using the ip dhcp snooping trust command from interface configuration mode.


Disabling Option 82

Disabling Option 82

The Information Option 82 has been disabled since the Access Switches are not acting as DHCP relay agents. If left enabled, DHCP requests received by the Distribution and Core Switches on untrusted ports will drop DHCP Discover messages.

Information Option 82 was disabled by executing the no ip dhcp snooping information option


DHCP Rate Limiting

DHCP Rate Limiting

To protect against DHCP Exhaustion attacks, a limit of 15 packets per second has been configured on all untrusted ports using the ip dhcp snooping limit rate 15 command from interface configuration mode.


Verifying DHCP Snooping Configuration

Verifying DHCP Snooping Configuration

I issued the ipconfig /renew command on PC1 and PC2.

Here is the output of the show ip dhcp snooping binding command on ASW1:

ASW1#show ip dhcp snooping binding 
MacAddress          IpAddress        Lease(sec)  Type           VLAN  Interface
------------------  ---------------  ----------  -------------  ----  -----------------
00:01:43:34:45:80   10.0.10.12       0           dhcp-snooping  10    FastEthernet0/1
00:D0:BA:89:DA:75   10.0.10.11       0           dhcp-snooping  10    FastEthernet0/2
Total number of bindings: 2

Finally, here is the output of the show ip dhcp snooping command on ASW1:

ASW1(config)#do sh ip dhcp snoop
Switch DHCP snooping is enabled
DHCP snooping is configured on following VLANs:
1-1000
Insertion of option 82 is disabled
Option 82 on untrusted port is not allowed
Verification of hwaddr field is enabled
Interface                  Trusted    Rate limit (pps)
-----------------------    -------    ----------------
FastEthernet0/1            no         15       
FastEthernet0/2            no         15     
GigabitEthernet0/1         yes        unlimited       
GigabitEthernet0/2         yes        unlimited  

Dynamic ARP Inspection

Enabling DAI

Enabling DAI

To protect against ARP Poisoning (man-in-the-middle) attacks, Dynamic ARP inspection was enabled globally on all Access Switches using the ip arp inspection vlan 1-1000 from global configuration mode.


Trusted Interfaces

Trusted Interfaces

Each Access Switch port connected to a Distribution Switch was configured as a trusted port using the ip arp inspection trust command from interface configuration mode.


Verifying DAI Configuration

Verifying DAI Configuration

Here is the output of the show ip arp inspection interfaces command on ASW1:

ASW1#show ip arp inspection interfaces
Interface        Trust State     Rate(pps)    Burst Interval
---------------  -----------     ---------    --------------
Fa0/1            Untrusted              15                 1
Fa0/2            Untrusted              15                 1
Fa0/3            Untrusted              15                 1
Fa0/4            Untrusted              15                 1
Fa0/5            Untrusted              15                 1
Fa0/6            Untrusted              15                 1
Fa0/7            Untrusted              15                 1
Fa0/8            Untrusted              15                 1
Fa0/9            Untrusted              15                 1
Fa0/10           Untrusted              15                 1
Fa0/11           Untrusted              15                 1
Fa0/12           Untrusted              15                 1
Fa0/13           Untrusted              15                 1
Fa0/14           Untrusted              15                 1
Fa0/15           Untrusted              15                 1
Fa0/16           Untrusted              15                 1
Fa0/17           Untrusted              15                 1
Fa0/18           Untrusted              15                 1
Fa0/19           Untrusted              15                 1
Fa0/20           Untrusted              15                 1
Fa0/21           Untrusted              15                 1
Fa0/22           Untrusted              15                 1
Fa0/23           Untrusted              15                 1
Fa0/24           Untrusted              15                 1
Gig0/1           Trusted                15                 1
Gig0/2           Trusted                15                 1

Port Security

Enabling Port Security

Enabling Port Security

To keep unknown devices from accessing the physical network, Port Security has been enabled on all Access Switch Access Ports using the switchport port-security command from interface configuration mode.


Sticky MAC Addresses

Sticky MAC Addresses

To add end host MAC addresses to the running configuration, the command switchport port-security mac-address sticky command was executed in interface configuration mode.

After pinging 8.8.8.8 from PC1, its MAC-address was added to the running configuration of ASW1.

Here is interface fa0/1’s configuration as shown in the running configuration:

interface FastEthernet0/1
 switchport access vlan 10
 ip dhcp snooping limit rate 15
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 switchport port-security mac-address sticky 0001.4334.4580

Triggering Port Security

Triggering Port Security

To trigger port security, I disconnected PC1 from ASW1’s F0/1 interface and connected a new PC.

Unfortunalty, the port does not enter an err-disabled state in Packet Tracer.

However, In the output of the show port-security interface fa0/1 command we can see the port status is now secure-shutdown and the Security violation Count is now 1.

ASW1(config-if)#do sh port-sec int fa0/1
Port Security              : Enabled
Port Status                : Secure-shutdown
Violation Mode             : Shutdown
Aging Time                 : 0 mins
Aging Type                 : Absolute
SecureStatic Address Aging : Disabled
Maximum MAC Addresses      : 1
Total MAC Addresses        : 1
Configured MAC Addresses   : 0
Sticky MAC Addresses       : 1
Last Source Address:Vlan   : 00D0.D3AC.07A8:10
Security Violation Count   : 1

Verifying Port Security Configuration

Verifying Port Security Configuration

Here is the output of the show port-security command on ASW1:

Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action
               (Count)       (Count)        (Count)
--------------------------------------------------------------------
        Fa0/1        1          1                 0         Shutdown
        Fa0/2        1          0                 0         Shutdown
        Fa0/3        1          0                 0         Shutdown
        Fa0/4        1          0                 0         Shutdown
        Fa0/5        1          0                 0         Shutdown
        Fa0/6        1          0                 0         Shutdown
        Fa0/7        1          0                 0         Shutdown
        Fa0/8        1          0                 0         Shutdown
        Fa0/9        1          0                 0         Shutdown
       Fa0/10        1          0                 0         Shutdown
       Fa0/11        1          0                 0         Shutdown
       Fa0/12        1          0                 0         Shutdown
       Fa0/13        1          0                 0         Shutdown
       Fa0/14        1          0                 0         Shutdown
       Fa0/15        1          0                 0         Shutdown
       Fa0/16        1          0                 0         Shutdown
       Fa0/17        1          0                 0         Shutdown
       Fa0/18        1          0                 0         Shutdown
       Fa0/19        1          0                 0         Shutdown
       Fa0/20        1          0                 0         Shutdown
       Fa0/21        1          0                 0         Shutdown
       Fa0/22        1          0                 0         Shutdown
       Fa0/23        1          0                 0         Shutdown
       Fa0/24        1          0                 0         Shutdown
----------------------------------------------------------------------

SSH

Genrating Keys

Genrating Keys

RSA key-pairs were generated for each device using the crypto key generate rsa command from global configuration mode.

A modulus size of 1024 was specified.


Version 2

Version 2

SSH Version 2 was enable for each device using the ip ssh version 2 command from global configuration mode.


Configuring VTY Lines

Configuring VTY Lines

The VTY lines for each device were configured by enter VTY line configuration mode using the line vty 0 15 command from global configuration mode.

Telnet was disabled by issuing the transport input ssh command in line configuration mode.

Local user authentication was specified by issuing login local command in line configuration mode.


Verifying Remote Managability

Verifying Remote Managability

Here is an example of SSH’ing into ASW1 from DSW1:

DSW1>ssh -l aiken 10.0.99.4

Password: 

ASW1>

Syslog

Enabling Time Stamps

Enabling Time Stamps

To show the date and time for syslog messages, I issued the service timestamps log datetime msec command from global configuration mode.

Here we can see the date and time shown in the output of a syslog message generated on ER1:

ER1(config)#service timestamps log datetime msec
ER1(config)#exit
ER1#
*Jun 16, 06:01:31.011: SYS-5-CONFIG_I: Configured from console by console
ER1#
Configuring the Syslog Server

Configuring the Syslog Server

SRV1 has been configured as the Syslog server.

First, I enabled Syslog services on SRV1, which is a button click in Packet Tracer.

Then, I issued the logging host 10.0.30.5 command from global configuration mode.

Here’s the output of the show logging command on ER1:

ER1#show logging
Syslog logging: enabled (0 messages dropped, 0 messages rate-limited,
        0 flushes, 0 overruns, xml disabled, filtering disabled)

No Active Message Discriminator.


No Inactive Message Discriminator.


  Console logging: level debugging, 12 messages logged, xml disabled,
        filtering disabled
  Monitor logging: level debugging, 12 messages logged, xml disabled,
        filtering disabled
  Buffer logging:  level debugging, 0 messages logged, xml disabled,
        filtering disabled

  Logging Exception size (4096 bytes)
  Count and timestamp logging messages: disabled
  Persistent logging: disabled

No active filter modules.

ESM: 0 messages dropped
  Trap logging: level debugging, 12 message lines logged
      Logging to 10.0.30.5  (udp port 514,  audit disabled,
           authentication disabled, encryption disabled, link up),
           2 message lines logged,
           0 message lines rate-limited,
           0 message lines dropped-by-MD,
           xml disabled, sequence number disabled
           filtering disabled

Full Device Configurations

ER1

ER1 Running Configuration

ER1#show run
Building configuration...

Current configuration : 2695 bytes
!
version 15.1
service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname ER1
!
!
!
enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
!
ip dhcp excluded-address 10.0.10.1 10.0.10.10
ip dhcp excluded-address 10.0.20.1 10.0.20.10
ip dhcp excluded-address 10.0.30.1 10.0.30.10
ip dhcp excluded-address 10.0.99.1 10.0.99.10
!
ip dhcp pool vlan10
 network 10.0.10.0 255.255.255.0
 default-router 10.0.10.1
 dns-server 10.0.30.5
 domain-name aiken.com
ip dhcp pool vlan20
 network 10.0.20.0 255.255.255.0
 default-router 10.0.20.1
 dns-server 10.0.30.5
 domain-name aiken.com
ip dhcp pool vlan30
 network 10.0.30.0 255.255.255.0
 default-router 10.0.30.1
 dns-server 10.0.30.5
 domain-name aiken.com
clock timezone EST -5
!
!
!
!
no ip cef
no ipv6 cef
!
!
!
username aiken secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
!
license udi pid CISCO2911/K9 sn FTX152400MB-
!
!
!
lldp run
!
!
!
!
!
!
!
ip ssh version 2
no ip domain-lookup
ip domain-name aiken.com
!
!
spanning-tree mode pvst
!
!
!
!
!
!
interface Loopback0
 ip address 10.255.0.1 255.255.255.255
!
interface GigabitEthernet0/0
 ip address 81.220.16.34 255.255.255.252
 ip nat outside
 duplex auto
 speed auto
!
interface GigabitEthernet0/1
 ip address 10.1.1.1 255.255.255.252
 ip ospf network point-to-point
 ip ospf priority 1
 ip nat inside
 duplex auto
 speed auto
!
interface GigabitEthernet0/2
 ip address 10.1.1.5 255.255.255.252
 ip ospf network point-to-point
 ip ospf priority 1
 ip nat inside
 duplex auto
 speed auto
!
interface GigabitEthernet0/0/0
 ip address 10.0.0.1 255.255.255.252
 ip ospf network point-to-point
 ip ospf priority 1
 standby version 2
!
interface GigabitEthernet0/1/0
 no ip address
 shutdown
!
interface Vlan1
 no ip address
 shutdown
!
router ospf 1
 router-id 10.255.0.1
 log-adjacency-changes
 passive-interface Loopback0
 network 10.1.1.0 0.0.0.3 area 0
 network 10.1.1.4 0.0.0.3 area 0
 network 10.255.0.1 0.0.0.0 area 0
 network 10.0.0.0 0.0.0.3 area 0
 default-information originate
!
ip nat inside source list pat interface GigabitEthernet0/0 overload
ip classless
ip route 0.0.0.0 0.0.0.0 81.220.16.33 
ip route 0.0.0.0 0.0.0.0 10.0.0.2 10
!
ip flow-export version 9
!
!
ip access-list extended pat
 permit ip 10.0.10.0 0.0.0.255 any
 permit ip 10.0.20.0 0.0.0.255 any
 permit ip 10.0.30.0 0.0.0.255 any
!
!
!
!
!
logging trap debugging
logging 10.0.30.5
line con 0
 exec-timeout 20 0
 logging synchronous
!
line aux 0
!
line vty 0 4
 login local
 transport input ssh
line vty 5 15
 login local
 transport input ssh
!
!
ntp authentication-key 1 md5 0822455D0A16 7
ntp authenticate
ntp trusted-key 1
ntp master 5
ntp update-calendar
!
end

CSW1

CSW1 Running Configuration

CSW1#show run
Building configuration...

Current configuration : 3608 bytes
!
version 16.3.2
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname CSW1
!
!
enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
!
!
!
!
!
no ip cef
ip routing
!
no ipv6 cef
!
!
!
username aiken secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
!
lldp run
!
!
!
!
!
!
!
!
!
ip ssh version 2
no ip domain-lookup
ip domain-name aiken.com
!
!
spanning-tree mode pvst
!
!
!
!
!
!
interface Loopback0
 ip address 10.255.0.3 255.255.255.255
!
interface Port-channel1
 no switchport
 ip address 10.2.2.17 255.255.255.252
!
interface GigabitEthernet1/0/1
 no switchport
 no ip address
 channel-group 1 mode desirable
 duplex auto
 speed auto
!
interface GigabitEthernet1/0/2
 no switchport
 no ip address
 channel-group 1 mode desirable
 duplex auto
 speed auto
!
interface GigabitEthernet1/0/3
 no switchport
 ip address 10.2.2.21 255.255.255.252
 ip ospf network point-to-point
 ip ospf priority 1
 duplex auto
 speed auto
!
interface GigabitEthernet1/0/4
 no switchport
 ip address 10.2.2.25 255.255.255.252
 ip ospf network point-to-point
 ip ospf priority 1
 duplex auto
 speed auto
!
interface GigabitEthernet1/0/5
 no switchport
 ip address 10.1.1.2 255.255.255.252
 ip ospf network point-to-point
 ip ospf priority 1
 duplex auto
 speed auto
!
interface GigabitEthernet1/0/6
 no switchport
 ip address 10.1.1.10 255.255.255.252
 ip ospf network point-to-point
 ip ospf priority 1
 duplex auto
 speed auto
!
interface GigabitEthernet1/0/7
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/8
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/9
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/10
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/11
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/12
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/13
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/14
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/15
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/16
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/17
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/18
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/19
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/20
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/21
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/22
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/23
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/24
 switchport mode access
 shutdown
!
interface GigabitEthernet1/1/1
 switchport mode access
 shutdown
!
interface GigabitEthernet1/1/2
 switchport mode access
 shutdown
!
interface GigabitEthernet1/1/3
 switchport mode access
 shutdown
!
interface GigabitEthernet1/1/4
 switchport mode access
 shutdown
!
interface Vlan1
 no ip address
 shutdown
!
router ospf 1
 router-id 10.255.0.3
 log-adjacency-changes
 passive-interface Loopback0
 network 10.2.2.16 0.0.0.3 area 0
 network 10.2.2.20 0.0.0.3 area 0
 network 10.2.2.24 0.0.0.3 area 0
 network 10.1.1.0 0.0.0.3 area 0
 network 10.1.1.8 0.0.0.3 area 0
 network 10.255.0.3 0.0.0.0 area 0
!
ip classless
!
ip flow-export version 9
!
!
!
!
!
!
!
line con 0
 exec-timeout 20 0
!
line aux 0
!
line vty 0 4
 login local
 transport input ssh
line vty 5 15
 login local
 transport input ssh
!
!
!
ntp authentication-key 1 md5 0822455D0A16 7
ntp authenticate
ntp trusted-key 1
ntp server 10.255.0.1 key 1
!
end

DSW1

DSW1 Running Configuration

DSW1#show run
Building configuration...

Current configuration : 4947 bytes
!
version 16.3.2
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname DSW1
!
!
enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
!
!
!
!
!
no ip cef
ip routing
!
no ipv6 cef
!
!
!
username aiken secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
!
lldp run
!
!
!
!
!
!
!
!
!
ip ssh version 2
no ip domain-lookup
ip domain-name aiken.com
!
!
vtp domain aiken.com
vtp mode transparent
vtp version 2
!
spanning-tree mode rapid-pvst
spanning-tree portfast default
spanning-tree vlan 1-1000 priority 0
!
!
!
!
!
!
vlan 10
 name Computers
!
vlan 20
 name Phones
!
vlan 30
 name Servers
!
vlan 99
 name Management
!
interface Loopback0
 ip address 10.255.0.5 255.255.255.255
!
interface Port-channel1
 switchport trunk native vlan 1000
 switchport trunk allowed vlan 10,20,30,99
 switchport mode trunk
!
interface GigabitEthernet1/0/1
 switchport trunk native vlan 1000
 switchport trunk allowed vlan 10,20,30,99
 switchport mode trunk
 channel-group 1 mode active
!
interface GigabitEthernet1/0/2
 switchport trunk native vlan 1000
 switchport trunk allowed vlan 10,20,30,99
 switchport mode trunk
 channel-group 1 mode active
!
interface GigabitEthernet1/0/3
 switchport trunk native vlan 1000
 switchport trunk allowed vlan 10,20,30,99
 switchport mode trunk
!
interface GigabitEthernet1/0/4
 switchport trunk native vlan 1000
 switchport trunk allowed vlan 10,20,30,99
 switchport mode trunk
!
interface GigabitEthernet1/0/5
 switchport trunk native vlan 1000
 switchport trunk allowed vlan 10,20,30,99
 switchport mode trunk
!
interface GigabitEthernet1/0/6
 no switchport
 ip address 10.2.2.22 255.255.255.252
 ip ospf network point-to-point
 ip ospf priority 1
 duplex auto
 speed auto
!
interface GigabitEthernet1/0/7
 no switchport
 ip address 10.2.2.30 255.255.255.252
 ip ospf network point-to-point
 ip ospf priority 1
 duplex auto
 speed auto
!
interface GigabitEthernet1/0/8
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/9
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/10
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/11
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/12
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/13
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/14
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/15
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/16
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/17
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/18
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/19
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/20
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/21
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/22
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/23
 switchport mode access
 shutdown
!
interface GigabitEthernet1/0/24
 switchport mode access
 shutdown
!
interface GigabitEthernet1/1/1
 switchport mode access
 shutdown
!
interface GigabitEthernet1/1/2
 switchport mode access
 shutdown
!
interface GigabitEthernet1/1/3
 switchport mode access
 shutdown
!
interface GigabitEthernet1/1/4
 switchport mode access
 shutdown
!
interface Vlan1
 no ip address
 shutdown
!
interface Vlan10
 mac-address 0001.43e7.9301
 ip address 10.0.10.2 255.255.255.0
 ip helper-address 10.255.0.1
 standby version 2
 standby 10 ip 10.0.10.1
 standby 10 priority 105
 standby 10 preempt
!
interface Vlan20
 mac-address 0001.43e7.9302
 ip address 10.0.20.2 255.255.255.0
 ip helper-address 10.255.0.1
 standby version 2
 standby 20 ip 10.0.20.1
 standby 20 priority 105
 standby 20 preempt
!
interface Vlan30
 mac-address 0001.43e7.9303
 ip address 10.0.30.2 255.255.255.0
 ip helper-address 10.255.0.1
 standby version 2
 standby 30 ip 10.0.30.1
 standby 30 priority 105
 standby 30 preempt
!
interface Vlan99
 mac-address 0001.43e7.9304
 ip address 10.0.99.2 255.255.255.0
 standby version 2
 standby 99 ip 10.0.99.1
 standby 99 priority 105
 standby 99 preempt
!
router ospf 1
 router-id 10.255.0.5
 log-adjacency-changes
 passive-interface GigabitEthernet1/0/3
 passive-interface GigabitEthernet1/0/4
 passive-interface GigabitEthernet1/0/5
 passive-interface Loopback0
 network 10.2.2.20 0.0.0.3 area 0
 network 10.2.2.28 0.0.0.3 area 0
 network 10.0.10.0 0.0.0.255 area 0
 network 10.0.20.0 0.0.0.255 area 0
 network 10.0.30.0 0.0.0.255 area 0
 network 10.0.99.0 0.0.0.255 area 0
 network 10.255.0.5 0.0.0.0 area 0
!
ip classless
!
ip flow-export version 9
!
!
!
!
!
!
!
line con 0
 exec-timeout 20 0
 logging synchronous
!
line aux 0
!
line vty 0 4
 login local
 transport input ssh
line vty 5 15
 login local
 transport input ssh
!
!
!
ntp authentication-key 1 md5 0822455D0A16 7
ntp authenticate
ntp trusted-key 1
ntp server 10.255.0.2 key 1
!
end

ASW1

ASW1 Running Configuration

ASW1#show run
Building configuration...

Current configuration : 5133 bytes
!
version 15.0
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname ASW1
!
enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
!
!
ip ssh version 2
no ip domain-lookup
ip domain-name aiken.com
!
username aiken secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
vtp domain aiken.com
vtp mode transparent
vtp version 2
!
ip arp inspection vlan 1-1000
!
ip dhcp snooping vlan 1-1000
ip dhcp snooping information option allow-untrusted
no ip dhcp snooping information option
ip dhcp snooping
!
lldp run
!
spanning-tree mode rapid-pvst
spanning-tree portfast default
spanning-tree portfast bpduguard default
spanning-tree extend system-id
!
vlan 10
 name Computers
!
vlan 20
 name Phones
!
vlan 30
 name Servers
!
vlan 99
 name Management
!
interface FastEthernet0/1
 switchport access vlan 10
 ip dhcp snooping limit rate 15
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 switchport port-security mac-address sticky 0001.4334.4580
!
interface FastEthernet0/2
 switchport access vlan 10
 ip dhcp snooping limit rate 15
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 switchport port-security violation restrict 
 switchport port-security mac-address sticky 00D0.BA89.DA75
!
interface FastEthernet0/3
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 switchport port-security mac-address sticky 0001.C79A.84DD
 shutdown
!
interface FastEthernet0/4
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 switchport port-security mac-address sticky 0060.5C5E.D904
 shutdown
!
interface FastEthernet0/5
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 shutdown
!
interface FastEthernet0/6
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 shutdown
!
interface FastEthernet0/7
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 shutdown
!
interface FastEthernet0/8
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 shutdown
!
interface FastEthernet0/9
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 shutdown
!
interface FastEthernet0/10
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 shutdown
!
interface FastEthernet0/11
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 shutdown
!
interface FastEthernet0/12
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 shutdown
!
interface FastEthernet0/13
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 shutdown
!
interface FastEthernet0/14
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 shutdown
!
interface FastEthernet0/15
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 shutdown
!
interface FastEthernet0/16
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 shutdown
!
interface FastEthernet0/17
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 shutdown
!
interface FastEthernet0/18
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 shutdown
!
interface FastEthernet0/19
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 shutdown
!
interface FastEthernet0/20
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 shutdown
!
interface FastEthernet0/21
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 shutdown
!
interface FastEthernet0/22
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 shutdown
!
interface FastEthernet0/23
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 shutdown
!
interface FastEthernet0/24
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky 
 shutdown
!
interface GigabitEthernet0/1
 switchport trunk native vlan 1000
 switchport trunk allowed vlan 10,20,30,99
 ip arp inspection trust
 ip dhcp snooping trust
 switchport mode trunk
!
interface GigabitEthernet0/2
 switchport trunk native vlan 1000
 switchport trunk allowed vlan 10,20,30,99
 ip arp inspection trust
 ip dhcp snooping trust
 switchport mode trunk
!
interface Vlan1
 no ip address
 shutdown
!
interface Vlan99
 ip address 10.0.99.4 255.255.255.240
!
ip default-gateway 10.0.99.1
!
!
!
!
line con 0
 logging synchronous
 exec-timeout 20 0
!
line vty 0 4
 login local
 transport input ssh
line vty 5 15
 login local
 transport input ssh
!
!
!
ntp authenticate
ntp trusted-key 1
ntp server 10.255.0.2 key 1
!
end