النتائج 1 إلى 2 من 2

الموضوع: امتحان العملى سيسكو اكاديمي لــ ccna simester 3 switchenig

  1. #1
    عضو
    تاريخ التسجيل
    Mar 2007
    المشاركات
    2
    معدل تقييم المستوى
    0

    امتحان العملى سيسكو اكاديمي لــ ccna simester 3 switchenig

    دى الطلبات اللى كانت مطلوبة فى الامتحان طبعا دة امتحانا سيسكو اكاديمى وان شاء الله كلة يستفاد



    ESwitching Basic Switching/Wireless PT Practice SBA
    A few things to keep in mind while completing this activity:
    Do not use the browser Back button or close or reload any exam windows during the exam.
    Do not close Packet Tracer when you are done. It will close automatically.
    Click the Submit Assessment button to submit your work.
    Introduction
    In this practice Packet Tracer Practice Skills Based Assement, you will:
    configure VLANs using VTP
    configure inter-VLAN routing
    modify STP
    configure port security
    add a wireless LAN
    Addressing Table
    Device Interface Address Subnet Mask Default Gateway
    Branch Fa0/0.40 10.10.40.1 255.255.255.0 n/a
    Fa0/0.50 10.10.50.1 255.255.255.0 n/a
    Fa0/0.55 10.10.55.1 255.255.255.0 n/a
    Fa0/0.80 10.10.80.1 255.255.255.0 n/a
    WLAN Internet 10.10.80.10 255.255.255.0 10.10.80.1
    Wireless 10.10.100.1 255.255.255.0 n/a
    S1 VLAN 55 10.10.55.11 255.255.255.0 10.10.55.1
    S2 VLAN 55 10.10.55.12 255.255.255.0 10.10.55.1
    S3 VLAN 55 10.10.55.13 255.255.255.0 10.10.55.1
    Staff 1 NIC 10.10.40.10 255.255.255.0 10.10.40.1
    Staff 2 NIC 10.10.40.11 255.255.255.0 10.10.40.1
    Admin NIC 10.10.50.10 255.255.255.0 10.10.50.1
    WRS PC NIC DHCP assigned 255.255.255.0 10.10.100.1

    Note: The password for user EXEC mode is cisco. The password for privileged EXEC mode is class.
    Step 1: Configure the Switches for Remote Access.
    Create, enable, and address VLAN 55 as the management interface on all three switches. Use the values found in the addressing table.
    Step 2: Configure Trunking.
    Note: Packet Tracer now supports the use of the range argument for the interface command.
    For interfaces FastEthernet 0/19 through FastEthernet 0/24 on all three switches:
    Configure static trunking.
    Assign VLAN 55 as the native VLAN.
    Step 3: Configure VTP and VLANs.
    a. Configure S1 as VTP server and the following VTP parameters:
    · S1 is the VTP server.
    · VTP domain name: BRANCH
    · VTP password: vtpbranch
    b. Create and name the following VLANs on S1.
    · VLAN 40: Staff
    · VLAN 50: Admin
    · VLAN 55: Management
    · VLAN 80: Wireless
    c. Configure S2 and S3 as VTP clients to participate in the BRANCH VTP domain.
    d. Verify that VTP is operational.
    Step 4: Configure Interfaces for VLAN Access
    VLAN port assignments on each switch are as follows:
    Device Ports Assignment
    S2, S3 Fa0/1 – 0/10 40
    S2, S3 Fa0/11 – 0/17 50
    S3 Fa0/18 80

    a. Configure access ports on access layer switches.
    · Configure the appropriate interfaces on S2 and S3 for access mode.
    · Assign VLANs according to the port assignments table.
    b. Verify trunking and VLAN assignments.
    Step 5: Configure Spanning Tree.
    a. Modify STP root bridge elections.
    · Using a priority of 12288, set S1 as the root bridge for all VLANs.
    · Using a priority of 16384, set S2 so that it will become the root for all VLANs if S1 fails.
    b. Verify the spanning tree election.
    Step 6: Configure Inter-VLAN Routing.
    Use the information in the Addressing Table to configure Branch for inter-VLAN routing. Be sure to designate the native VLAN.
    Verify inter-VLAN routing.
    Step 7: Configure Port Security.
    Note: Best practice requires port security on all access ports. However, for this practice exercise you will only configure one port with security.
    a. Configure S3 with port security on FastEthernet 0/2.
    · Enable port security.
    · No more than two MAC addresses are allowed on the FastEthernet 0/2 port for S3.
    · Once learned, MAC addresses should be automatically added to the running configuration.
    · If this policy is violated, the port should be automatically disabled.
    b. Verify that port security is implemented.
    Step 8: Configure the Wireless LAN.
    Refer to the Addressing Table to configure the wireless LAN.
    a. Configure WLAN.
    · Use static addressing on the Internet interface.
    · Set the router IP and subnet mask.
    · Use the DHCP Server Settings to configure the router to provide wireless hosts with an IP address.
    · The starting IP address in the wireless LAN subnet is 10.10.100.15.
    · The maximum number of users is 75.
    b. Configure wireless security.
    · Set the SSID to Branch_WLAN.
    · Enable WEP security and use 0123456789 as key1.
    c. Use branch123 as the remote management password.
    d. Configure WRS PC to access the wireless network that is provided by WLAN. WRS PC uses DHCP to obtain addressing information.
    Note: It will not be possible for devices to ping WRS PC since WRS PC is behind the WLAN NAT firewall.
    Step 9: Verify Connectivity.
    Although these are not scored, the following connectivity tests should be successful.
    S1 can ping Branch.
    S2 can ping Branch.
    S3 can ping Branch.
    Staff 1 can ping Admin.
    Admin can ping Staff 2.
    WRS PC can ping Staff 1.

    Version 1.0
    Created in Packet Tracer 5.3.2.0027 and Marvel 1.0.1
    All contents are Copyright © 1992 - 2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.


    ESwitching Basic Switching/Wireless PT Practice SBA
    A few things to keep in mind while completing this activity:
    Do not use the browser Back button or close or reload any exam windows during the exam.
    Do not close Packet Tracer when you are done. It will close automatically.
    Click the Submit Assessment button to submit your work.
    Introduction
    In this practice Packet Tracer Practice Skills Based Assement, you will:
    configure VLANs using VTP
    configure inter-VLAN routing
    modify STP
    configure port security
    add a wireless LAN
    Addressing Table
    Device Interface Address Subnet Mask Default Gateway
    Branch Fa0/0.40 10.10.40.1 255.255.255.0 n/a
    Fa0/0.50 10.10.50.1 255.255.255.0 n/a
    Fa0/0.55 10.10.55.1 255.255.255.0 n/a
    Fa0/0.80 10.10.80.1 255.255.255.0 n/a
    WLAN Internet 10.10.80.10 255.255.255.0 10.10.80.1
    Wireless 10.10.100.1 255.255.255.0 n/a
    S1 VLAN 55 10.10.55.11 255.255.255.0 10.10.55.1
    S2 VLAN 55 10.10.55.12 255.255.255.0 10.10.55.1
    S3 VLAN 55 10.10.55.13 255.255.255.0 10.10.55.1
    Staff 1 NIC 10.10.40.10 255.255.255.0 10.10.40.1
    Staff 2 NIC 10.10.40.11 255.255.255.0 10.10.40.1
    Admin NIC 10.10.50.10 255.255.255.0 10.10.50.1
    WRS PC NIC DHCP assigned 255.255.255.0 10.10.100.1

    Note: The password for user EXEC mode is cisco. The password for privileged EXEC mode is class.
    Step 1: Configure the Switches for Remote Access.
    Create, enable, and address VLAN 55 as the management interface on all three switches. Use the values found in the addressing table.
    Step 2: Configure Trunking.
    Note: Packet Tracer now supports the use of the range argument for the interface command.
    For interfaces FastEthernet 0/19 through FastEthernet 0/24 on all three switches:
    Configure static trunking.
    Assign VLAN 55 as the native VLAN.
    Step 3: Configure VTP and VLANs.
    a. Configure S1 as VTP server and the following VTP parameters:
    · S1 is the VTP server.
    · VTP domain name: BRANCH
    · VTP password: vtpbranch
    b. Create and name the following VLANs on S1.
    · VLAN 40: Staff
    · VLAN 50: Admin
    · VLAN 55: Management
    · VLAN 80: Wireless
    c. Configure S2 and S3 as VTP clients to participate in the BRANCH VTP domain.
    d. Verify that VTP is operational.
    Step 4: Configure Interfaces for VLAN Access
    VLAN port assignments on each switch are as follows:
    Device Ports Assignment
    S2, S3 Fa0/1 – 0/10 40
    S2, S3 Fa0/11 – 0/17 50
    S3 Fa0/18 80

    a. Configure access ports on access layer switches.
    · Configure the appropriate interfaces on S2 and S3 for access mode.
    · Assign VLANs according to the port assignments table.
    b. Verify trunking and VLAN assignments.
    Step 5: Configure Spanning Tree.
    a. Modify STP root bridge elections.
    · Using a priority of 12288, set S1 as the root bridge for all VLANs.
    · Using a priority of 16384, set S2 so that it will become the root for all VLANs if S1 fails.
    b. Verify the spanning tree election.
    Step 6: Configure Inter-VLAN Routing.
    Use the information in the Addressing Table to configure Branch for inter-VLAN routing. Be sure to designate the native VLAN.
    Verify inter-VLAN routing.
    Step 7: Configure Port Security.
    Note: Best practice requires port security on all access ports. However, for this practice exercise you will only configure one port with security.
    a. Configure S3 with port security on FastEthernet 0/2.
    · Enable port security.
    · No more than two MAC addresses are allowed on the FastEthernet 0/2 port for S3.
    · Once learned, MAC addresses should be automatically added to the running configuration.
    · If this policy is violated, the port should be automatically disabled.
    b. Verify that port security is implemented.
    Step 8: Configure the Wireless LAN.
    Refer to the Addressing Table to configure the wireless LAN.
    a. Configure WLAN.
    · Use static addressing on the Internet interface.
    · Set the router IP and subnet mask.
    · Use the DHCP Server Settings to configure the router to provide wireless hosts with an IP address.
    · The starting IP address in the wireless LAN subnet is 10.10.100.15.
    · The maximum number of users is 75.
    b. Configure wireless security.
    · Set the SSID to Branch_WLAN.
    · Enable WEP security and use 0123456789 as key1.
    c. Use branch123 as the remote management password.
    d. Configure WRS PC to access the wireless network that is provided by WLAN. WRS PC uses DHCP to obtain addressing information.
    Note: It will not be possible for devices to ping WRS PC since WRS PC is behind the WLAN NAT firewall.
    Step 9: Verify Connectivity.
    Although these are not scored, the following connectivity tests should be successful.
    S1 can ping Branch.
    S2 can ping Branch.
    S3 can ping Branch.
    Staff 1 can ping Admin.
    Admin can ping Staff 2.
    WRS PC can ping Staff 1.

    Version 1.0
    Created in Packet Tracer 5.3.2.0027 and Marvel 1.0.1
    All contents are Copyright © 1992 - 2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.



  2. #2
    عضوية جديدة
    تاريخ التسجيل
    Nov 2012
    المشاركات
    1
    معدل تقييم المستوى
    0

    رد: امتحان العملى سيسكو اكاديمي لــ ccna simester 3 switchenig

    بارك الله فيك

المفضلات

ضوابط المشاركة

  • لا تستطيع إضافة مواضيع جديدة
  • لا تستطيع الرد على المواضيع
  • لا تستطيع إرفاق ملفات
  • لا تستطيع تعديل مشاركاتك
  •