Section 16 – Review 1

Welcome to your first review day. I told you that you’d have plenty of time for going over previous lessons!

We have covered pretty much everything you need to know to get through the ICND1 exam. If you are doing the full CCNA exam, then you still need to review everything you have learned so far. I don’t want to dwell on the more ambiguous areas, such as the OSI model or CSMA/CD, because they are less likely to come up in the exam, and because the few facts you need to know should be easily remembered AND you can review them in the cram guide.

Section 16 Tasks

  • Take the OSI exam below
  • Complete the switching and switch security challenge labs
  • Read the ICND1 cram guide
  • Spend 15 minutes on the subnetting.org website

Section 16 Exam

  1. Data take the form of segments at which OSI layer?
  2. Which OSI layer deals with compression?
  3. Which OSI layer sets up, manages, and terminates dialogues across the network?
  4. Logical addressing takes place at which OSI layer?
  5. Flow control, windowing, and acknowledgements take place at which OSI layer?
  6. What are the typical types of Layer 1 network issues?
  7. Name the four layers of the TCP (DoD) model.
  8. Which TCP layer maps to the Transport Layer of the OSI model?
  9. MAC addresses correspond to which OSI layer?
  10. Name two protocols used at the Transport Layer.

Section 16 Answers

  1. The Transport Layer.
  2. The Presentation Layer.
  3. The Session Layer.
  4. The Network Layer.
  5. The Transport Layer.
  6. Bad cables and hub issues.
  7. Network Interface/Internet/Transport/Application Layers.
  8. The Transport Layer.
  9. The Data Link Layer.
  10. TCP and UDP.

Section 16 Lab 1 – Switch Configuration

Topology

Instructions

Follow Section 2 Lab.

Section 16 Lab 2 – Switch Security

Topology

Instructions

Connect to the switch using a console connection. Connect a PC to the switch or connect the switch to the FastEthernet port on a router:

1. Add port security to an interface on the switch
2. Hard set the MAC address of the PC/router interface as the permitted address
3. Ensure that the switch interface is up (and an IP address is on the PC)
4. Set the port security violation action to “restrict”
5. Change the MAC address of the PC, or plug in another machine
6. Issue a show port-security interface x command on the switch

Solution Hints and Commands

  • Before configuring port security, it is recommended that the switch port be statically configured as a Layer 2 access port. This configuration is illustrated in the following output:
VTP-Server-1(config)#interface FastEthernet0/1
VTP-Server-1(config-if)#switchport
VTP-Server-1(config-if)#switchport mode access
  • Use the switchport port-security command to enable port security on a switch interface
  • Use the switchport port-security mac-address xxxx.xxxx.xxxx command to hard set the MAC address as the permit address
  • Use the show ip interface brief command to verify interface status
  • Use the switchport port-security violation restrict command to configure violation action
  • Use the show port-security command


Related Articles

Leave a Reply

avatar