
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CCNA Lab Manual Archives - TECHNIG</title>
	<atom:link href="https://www.technig.com/tag/ccna-lab-manual/feed/" rel="self" type="application/rss+xml" />
	<link>https://168.138.42.164/tag/ccna-lab-manual/</link>
	<description>Gateway for IT Experts and Tech Geeks</description>
	<lastBuildDate>Wed, 23 Jun 2021 08:18:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>

<image>
	<url>https://www.technig.com/wp-content/uploads/2020/04/32x32.png</url>
	<title>CCNA Lab Manual Archives - TECHNIG</title>
	<link>https://168.138.42.164/tag/ccna-lab-manual/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">162720667</site>	<item>
		<title>How to Configure Switch Port Security on Cisco Switches?</title>
		<link>https://www.technig.com/configure-switch-port-security-cisco-switches/</link>
					<comments>https://www.technig.com/configure-switch-port-security-cisco-switches/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Wed, 09 May 2018 05:00:34 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Certification]]></category>
		<category><![CDATA[CCNA Lab Manual]]></category>
		<category><![CDATA[CCNA Packet Tracer Lab]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Switch Port Security]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=14693</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Switch Port Security on Cisco Switch - Technig" decoding="async" fetchpriority="high" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig.jpg 840w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>This article describes how to configure switch port security on Cisco Switches. It provides guidelines, procedures, and configuration examples. To practice and learn to configure port security on Cisco switch, just download the port security packet tracer lab or create your own lab and follow the switch port security configuration guideline. Download Switch Port Security [&#8230;]</p>
<p>The post <a href="https://www.technig.com/configure-switch-port-security-cisco-switches/">How to Configure Switch Port Security on Cisco Switches?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Switch Port Security on Cisco Switch - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig.jpg 840w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>This article describes how to configure switch port security on Cisco Switches. It provides guidelines, procedures, and configuration examples. To practice and learn to configure port security on Cisco switch, just download the port security packet tracer lab or create your own lab and follow the switch port security configuration guideline.</p>
<p><strong>Download</strong> <a href="https://www.technig.com/wp-content/uploads/2018/05/Configure-Port-Security-on-Cisco-Switches-Technig.zip" target="_blank" rel="noopener noreferrer">Switch Port Security Configuration</a> Packet Tracer Lab.</p>
<figure id="attachment_14695" aria-describedby="caption-attachment-14695" style="width: 841px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-Switch-Port-Security-on-Cisco-Switches-Technig.jpg"><img decoding="async" class="wp-image-14695 size-full" src="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-Switch-Port-Security-on-Cisco-Switches-Technig.jpg" alt="How to Configure Switch Port Security on Cisco Switches - Technig" width="841" height="490" srcset="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-Switch-Port-Security-on-Cisco-Switches-Technig.jpg 841w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-Switch-Port-Security-on-Cisco-Switches-Technig-300x175.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-Switch-Port-Security-on-Cisco-Switches-Technig-768x447.jpg 768w" sizes="(max-width: 841px) 100vw, 841px" /></a><figcaption id="caption-attachment-14695" class="wp-caption-text">How to Configure Switch Port Security on Cisco Switches &#8211; Technig</figcaption></figure>
<h2 class="p_H_Head1">Port Security Guidelines and Restrictions</h2>
<p class="pB1_Body1">Follow these guidelines when configuring port security.</p>
<ul style="list-style-type: circle;">
<li class="pBu1_Bullet1">A secure port cannot be a trunk port.</li>
<li class="pBu1_Bullet1">A secure port cannot be a destination port for Switch Port Analyzer (SPAN).</li>
<li class="pBu1_Bullet1">A secure port cannot belong to an EtherCha<img decoding="async" style="text-transform: initial;" src="https://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" alt="" width="19" height="2" border="0" /><span style="text-transform: initial;">nnel port-channel interface.</span></li>
<li class="pBu1_Bullet1">A secure port and static MAC address configuration are mutually exclusive.</li>
</ul>
<h2 class="p_H_Head1">Configure Switch Port Security</h2>
<p class="pB1_Body1">These sections describe how to configure port security using the Packet Tracer &#8211; Configuring Switch Port Security Lab.</p>
<p>In this activity, you will configure and verify port security on a switch. Port security allows you to restrict a port’s ingress traffic by limiting the MAC addresses that are allowed to send traffic to the port.</p>
<p><strong>Part 1:</strong> Configure Port Security</p>
<p>a. Access the command line for S1 and enable port security on Fast Ethernet ports 0/1 and 0/2.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">SW1&gt;enable 
SW1#configure terminal 
Enter configuration commands, one per line.  End with CNTL/Z.
SW1(config)#interface range fastEthernet 0/1-2
SW1(config-if-range)#switchport mode access 
SW1(config-if-range)#
SW1(config-if-range)#switchport port-security 
SW1(config-if-range)#</pre>
<p>b. Set the maximum so that only one device can access the Fast Ethernet ports 0/1 and 0/2.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">SW1(config-if-range)#switchport port-security maximum 1
SW1(config-if-range)#</pre>
<p>c. Secure the ports so that the MAC address of a device is dynamically learned and added to the running configuration.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">SW1(config-if-range)#switchport port-security mac-address sticky 
SW1(config-if-range)#</pre>
<p>d. Set the violation so that the Fast Ethernet ports 0/1 and 0/2 are not disabled when a violation occurs, but packets are dropped from an unknown source.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">SW1(config-if-range)#switchport port-security violation restrict 
SW1(config-if-range)#</pre>
<p>e. Disable all the remaining unused ports. Hint: Use the range keyword to apply this configuration to all the ports simultaneously.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">SW1(config)#interface range fastEthernet 0/3-24, gigabitEthernet 0/1-2
SW1(config-if-range)#shutdown</pre>
<p>It&#8217;s all and enough to configure switch port security on this lab. Let&#8217;s test it.</p>
<p><strong>Part 2:</strong> Verify Port Security</p>
<p>Try to test your switch port security configuration with ping command and testing with the rogue laptop on the lab</p>
<ul>
<li>a. From PC1, ping PC2.</li>
<li>b. Verify port security is enabled and the MAC addresses of PC1 and PC2 were added to the running configuration with &#8220;<strong>show run</strong>&#8221; command.</li>
<li>c. Attach Rogue Laptop to any unused switch port and notice that the link lights are red.</li>
<li>d. Enable the port and verify that Rogue Laptop can ping PC1 and PC2. After verification shut down the port connected to Rogue Laptop.</li>
<li>e. Disconnect PC2 and connect Rogue Laptop to PC2’s port. Verify that Rogue Laptop is unable to ping PC1.</li>
<li>f. Display the port security violations for the port Rogue Laptop is connected to.</li>
<li>g. Disconnect Rouge Laptop and reconnect PC2. Verify PC2 can ping PC1.</li>
<li>h. Why is PC2 able to ping PC1, but the Rouge Laptop is not?</li>
</ul>
<p>That&#8217;s all, you need to learn about to configure switch port security on Cisco switches. If you need to study more about switch port security, try to read a book or simply read the below materials.</p>
<h3 class="p_H_Head1">Default Port Security Configuration</h3>
<table id="wp1047723table1047720" border="1" width="80%" cellspacing="0" cellpadding="3">
<tbody>
<tr align="left" valign="bottom">
<th scope="col">
<section class="pCH1_CellHead1">Feature</section>
</th>
<th scope="col">
<section class="pCH1_CellHead1">Default Setting</section>
</th>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Port security</p>
</td>
<td>
<p class="pB1_Body1">Disabled on a port</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Maximum number of secure MAC addresses</p>
</td>
<td>
<p class="pB1_Body1">1</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Violation mode</p>
</td>
<td>
<p class="pB1_Body1">Shutdown. The port shuts down when the maximum number of secure MAC addresses is exceeded, and an SNMP trap notification is sent.</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Aging</p>
</td>
<td>
<p class="pB1_Body1">Disabled</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Aging type</p>
</td>
<td>
<p class="pB1_Body1">Absolute</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Static Aging</p>
</td>
<td>
<p class="pB1_Body1">Disabled</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Sticky</p>
</td>
<td>
<p class="pB1_Body1">Disabled</p>
</td>
</tr>
</tbody>
</table>
<h2 class="p_H_Head1">Overview of Configure Switch Port Security</h2>
<p class="pBu1_Bullet1">You can configure MAC addresses to be sticky. These can be dynamically learned or manually configured, stored in the address table, and added to the running configuration. If these addresses are saved in the configuration file, the interface does not need to dynamically relearn them when the switch restarts. Although sticky secure addresses can be manually configured, it is not recommended.</p>
<p class="pB1_Body1">You can configure an interface to convert the dynamic MAC addresses to sticky secure MAC addresses and to add them to the running configuration by enabling <em class="cEmphasis">sticky learning</em>. To enable sticky learning, enter the <b class="cBold">switchport</b> <b class="cBold">port-security mac-address sticky</b> command. When you enter this command, the interface converts all the dynamic secure MAC addresses, including those that were dynamically learned before sticky learning was enabled, to sticky secure MAC addresses.</p>
<p class="pB1_Body1">The sticky secure MAC addresses do not automatically become part of the configuration file, which is the startup<em class="cEmphasis"> </em>configuration used each time the switch restarts. If you save the sticky secure MAC addresses in the configuration file, when the switch restarts, the interface does not need to relearn these addresses. If you do not save the configuration, they are lost</p>
<p class="pB1_Body1">If sticky learning is disabled, the sticky secure MAC addresses are converted to dynamic secure addresses and are removed from the running configuration.</p>
<p class="pB1_Body1">After the maximum number of secure MAC addresses is configured, they are stored in an address table. To ensure that an attached device has the full bandwidth of the port, configure the MAC address of the attached device and set the maximum number of addresses to one, which is the default.</p>
<p class="pB1_Body1">A security violation occurs if the maximum number of secure MAC addresses has been added to the address table and a workstation whose MAC address is not in the address table attempts to access the interface.</p>
<p class="pB1_Body1">You can configure the interface for one of these violation modes, based on the action to be taken if a violation occurs:</p>
<ul>
<li class="pBu1_Bullet1"><strong>Restrict</strong>—A port security violation restricts data, causes the SecurityViolation counter to increment, and causes an SNMP Notification to be generated. The rate at which SNMP traps are generated can be controlled by the SNMP-server enable traps port-security trap-rate command. The default value (&#8220;0&#8221;) causes an SNMP trap to be generated for every security violation.</li>
<li class="pBu1_Bullet1"><strong>Shutdown</strong>—A port security violation causes the interface to shut down immediately. When a secure port is in the error-disabled state, you can bring it out of this state by entering the <b class="cBold">errdisable recovery cause</b> psecure-violation global configuration command or you can manually re-enable it by entering the <b class="cBold">shutdown</b> and <b class="cBold">no shutdown</b> interface configuration commands. This is the default mode.</li>
</ul>
<p class="pB2_Body2">You can also customize the time to recover from the specified error-disable cause (default is 300 seconds) by entering the <b class="cBold">errdisable recovery interval </b>command.</p>
<p>Source: <a href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ew/configuration/guide/conf/port_sec.html" target="_blank" rel="noopener noreferrer">Cisco</a></p>
<h3>Related Search Queries:</h3>
<ul>
<li>Cisco port security violation</li>
<li>Switchport port-security maximum 2</li>
<li>Cisco port security violation options</li>
<li>Switchport port-security violation restrict vs protect</li>
<li>Port security configuration in packet tracer</li>
<li>Switchport port-security mac-address sticky</li>
<li>Port security in networking</li>
<li>Port security pdf</li>
<li>Switchport port-security maximum</li>
<li>Switchport port-security violation restrict vs protect</li>
<li>Cisco port security violation options</li>
<li>Switchport port-security mac-address sticky</li>
</ul>
<p>The post <a href="https://www.technig.com/configure-switch-port-security-cisco-switches/">How to Configure Switch Port Security on Cisco Switches?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/configure-switch-port-security-cisco-switches/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14693</post-id>	</item>
		<item>
		<title>How to Configure SSH on Cisco Router or Switch?</title>
		<link>https://www.technig.com/configure-ssh-on-cisco-router/</link>
					<comments>https://www.technig.com/configure-ssh-on-cisco-router/#respond</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Tue, 08 May 2018 05:00:16 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Certification]]></category>
		<category><![CDATA[CCNA Lab Manual]]></category>
		<category><![CDATA[CCNA Packet Tracer Lab]]></category>
		<category><![CDATA[Cisco Router Configuration]]></category>
		<category><![CDATA[Cisco Switch Configuration]]></category>
		<category><![CDATA[How to]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=14677</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-SSH-on-Cisco-Router-or-Switch-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="How to Configure SSH on Cisco Router or Switch - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-SSH-on-Cisco-Router-or-Switch-Technig.jpg 840w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-SSH-on-Cisco-Router-or-Switch-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-SSH-on-Cisco-Router-or-Switch-Technig-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>Short and complete guide to configure SSH on Cisco router and switch for secure remote connection. The Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best-known example application is for remote login to computer systems by users. SSH provides a secure channel over an unsecured [&#8230;]</p>
<p>The post <a href="https://www.technig.com/configure-ssh-on-cisco-router/">How to Configure SSH on Cisco Router or Switch?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-SSH-on-Cisco-Router-or-Switch-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="How to Configure SSH on Cisco Router or Switch - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-SSH-on-Cisco-Router-or-Switch-Technig.jpg 840w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-SSH-on-Cisco-Router-or-Switch-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-SSH-on-Cisco-Router-or-Switch-Technig-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>Short and complete guide to configure SSH on <a href="https://www.cisco.com/c/en_au/products/routers/index.html" target="_blank" rel="noopener noreferrer">Cisco router</a> and switch for secure remote connection. The Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best-known example application is for remote login to computer systems by users.</p>
<p>SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.</p>
<p><strong>The typical use of SSH Protocol</strong></p>
<p>The protocol is used in corporate networks for:</p>
<ul>
<li>providing secure access for users and automated processes</li>
<li>interactive and automated file transfers</li>
<li>issuing remote commands</li>
<li>managing network infrastructure and other mission-critical system components.</li>
</ul>
<h2>Configure SSH on Cisco Router or Switch</h2>
<p>To configure SSH on Cisco router, you need to do:</p>
<ol>
<li>Enable SSH on Cisco router.</li>
<li>Set Password for SSH.</li>
<li>Force remote access to use SSH.</li>
<li>Enable Password Encryption.</li>
<li>Add domain name Server (DNS).</li>
<li>Add Username and Password.</li>
</ol>
<p>Let&#8217;s enable and configure SSH on Cisco router or switch using the below packet tracer lab. The configure on a packet tracer lab and real Cisco devices are the same. Just try to learn and do it what the SSH remote authentication needs.</p>
<p>Download the packet tracer lab or create your own lab. <a href="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-SSH-on-Ciscor-Router-or-Switch.zip" target="_blank" rel="noopener noreferrer"><strong>SSH Configuration Packet Tracer Lab</strong></a>.</p>
<figure id="attachment_14680" aria-describedby="caption-attachment-14680" style="width: 916px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/05/Configure-SSH-on-Cisco-Router-or-Switch-Technig.jpg"><img loading="lazy" decoding="async" class="wp-image-14680 size-full" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-SSH-on-Cisco-Router-or-Switch-Technig.jpg" alt="Configure SSH on Cisco Router or Switch - Technig" width="916" height="495" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-SSH-on-Cisco-Router-or-Switch-Technig.jpg 916w, https://www.technig.com/wp-content/uploads/2018/05/Configure-SSH-on-Cisco-Router-or-Switch-Technig-300x162.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-SSH-on-Cisco-Router-or-Switch-Technig-768x415.jpg 768w" sizes="(max-width: 916px) 100vw, 916px" /></a><figcaption id="caption-attachment-14680" class="wp-caption-text">Configure SSH on Cisco Router or Switch &#8211; Technig</figcaption></figure>
<p>In this example, I just enable and configure SSH on SW1 and trying to access it from PC1. It&#8217;s enough to learn how to configure SSH on Cisco router.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">R1&gt;
R1&gt;enable 
R1#configure terminal 
Enter configuration commands, one per line.  End with CNTL/Z.
R1(config)#
R1(config)#ip domain-name Technig.com
R1(config)#crypto key generate rsa 
The name for the keys will be: R1.Technig.com
Choose the size of the key modulus in the range of 360 to 2048 for your
  General Purpose Keys. Choosing a key modulus greater than 512 may take
  a few minutes.

How many bits in the modulus [512]: 1024
% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]

R1(config)#
*Mar 1 0:5:57.974:  %SSH-5-ENABLED: SSH 1.99 has been enabled 
R1(config)#
R1(config)#username Admin password Technig
R1(config)#line vty 0 4
R1(config-line)#login local 
R1(config-line)#transport input ssh 
R1(config-line)#exit
R1(config)#ip ssh version 2
R1(config)#ip ssh authentication-retries 3
R1(config)#
R1(config)#ip ssh time-out 120
R1(config)#exit
R1#

</pre>
<p>That&#8217;s all. Let&#8217;s check the process one by one.</p>
<ol>
<li>I have set DNS domain name with &#8220;<strong>IP domain-name</strong>&#8221; command.</li>
<li>Then configure the router to use <strong>RSA</strong> key pair with modulus size of <strong>1024</strong> bites for remote service authentication with &#8220;<strong style="text-transform: initial;">crypto key generate rsa</strong><span style="text-transform: initial;">&#8221; command.</span></li>
<li>Add username &#8220;<strong>Admin</strong>&#8221; with Password of &#8220;<strong>Technig</strong>&#8221; for ssh authentication.</li>
<li>Enabled ssh with &#8220;<strong>line vty 0 4</strong>&#8221; command.</li>
<li>Configure ssh to use local username and password with &#8220;<strong>login local</strong>&#8221; command. <strong>Remember</strong> that you can set a username and password for ssh with &#8220;<strong>username Admin password Technig</strong>&#8221; command as well. But here we configure ssh to use local username and password.</li>
<li>Configure the router to accept only ssh connection with &#8220;<strong>transport input ssh</strong>&#8221; command.</li>
<li>Configure ssh to version 2 using &#8220;<strong>IP ssh version 2</strong>&#8221; and set the authentication times to 3 with &#8220;<strong>IP ssh authentication-retries 3</strong>&#8221; command.</li>
<li>Finally set the ssh timeout to 120 seconds with &#8220;<strong>IP ssh time-out 120</strong>&#8221; command.</li>
</ol>
<p><strong>Related Article:</strong> <a href="https://www.enlinux.com/install-configure-ssh-on-centos/" target="_blank" rel="noopener noreferrer">Install SSH on CentOS 8.x and Red Hat Linux</a></p>
<p>The final step is to test the connectivity of ssh from PC1 with &#8220;<strong>ssh -l Admin 192.168.1.1</strong>&#8221; command for command prompt.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true ">C:\&gt;ssh -l Admin 192.168.1.1
Open
Password: 


R1&gt;en
R1&gt;enable 
Password: 
R1#</pre>
<p>OK, the ssh works perfectly.</p>
<p>The post <a href="https://www.technig.com/configure-ssh-on-cisco-router/">How to Configure SSH on Cisco Router or Switch?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/configure-ssh-on-cisco-router/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14677</post-id>	</item>
		<item>
		<title>How to Configure Banner MOTD on Cisco Switch and Router?</title>
		<link>https://www.technig.com/how-to-configure-banner-motd-on-cisco-switch-and-router/</link>
					<comments>https://www.technig.com/how-to-configure-banner-motd-on-cisco-switch-and-router/#respond</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Mon, 07 May 2018 02:24:13 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Certification]]></category>
		<category><![CDATA[CCNA Lab Manual]]></category>
		<category><![CDATA[CCNA Packet Tracer Lab]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[Cisco Router Configuration]]></category>
		<category><![CDATA[How to]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=14609</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Banner Motd on Cisco Switch and Router - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png 840w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig-300x150.png 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig-768x384.png 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>If you faced with the below error when you try to configure banner motd on Cisco switch or router. You can easily fix Cisco Motd banner ASCII art using this MOTD Banner configuration guide. SW1(config-line)#motd-banner !No Access for You?! ^ % Invalid input detected at '^' marker. It means that you did not type the banner [&#8230;]</p>
<p>The post <a href="https://www.technig.com/how-to-configure-banner-motd-on-cisco-switch-and-router/">How to Configure Banner MOTD on Cisco Switch and Router?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Banner Motd on Cisco Switch and Router - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png 840w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig-300x150.png 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig-768x384.png 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>If you faced with the below error when you try to configure banner motd on Cisco switch or router. You can easily fix Cisco Motd banner ASCII art using this MOTD Banner configuration guide.</p>
<pre class=""><code class="language-markup">SW1(config-line)#motd-banner !No Access for You?!
^
% Invalid input detected at '^' marker.</code></pre>
<p>It means that you did not type the banner motd command correctly. Let&#8217;s test it and configure banner motd on Cisco switch and router using packet tracer.</p>
<h3>What is MOTD Banner?</h3>
<p>A <i>banner</i> is a message presented to a user who is using the Cisco switch. The type of banner you configured for use determines when this message is shown. You can configure three main types of banners on your Cisco switch, as shown here:</p>
<ul class="level-one">
<li>
<p class="first-para"><b>The message of the Day (MOTD):</b> This type of login message has been around for a long time on Unix and mainframe systems. The idea of the message is to display a temporary notice to users, such as issues with system availability.</p>
<p class="child-para">However, because the message displays when a user connects to the device before login, most network administrators are now using it to display legal notices regarding access to the switch, such as <i>unauthorized access to this device is prohibited and violators will be prosecuted to the full extent of the law</i> and other such cheery endearments.</p>
</li>
<li>
<p class="first-para"><b>Login:</b> This banner is displayed before login to the system, but after the MOTD banner is displayed. Typically, this banner is used to display a permanent message to the users.</p>
</li>
<li>
<p class="first-para"><b>Exec:</b> This banner displays after the login is complete when the connecting user enters User EXEC mode. Whereas all users who attempt to connect to the switch see the other banners, only users who successfully log on to the switch see this banner, which can be used to post reminders to your network administrators.</p>
</li>
</ul>
<figure id="attachment_14615" aria-describedby="caption-attachment-14615" style="width: 840px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png"><img loading="lazy" decoding="async" class="wp-image-14615 size-full" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png" alt="Configure Banner Motd on Cisco Switch and Router - Technig" width="840" height="420" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png 840w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig-300x150.png 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig-768x384.png 768w" sizes="(max-width: 840px) 100vw, 840px" /></a><figcaption id="caption-attachment-14615" class="wp-caption-text">Configure Banner Motd on Cisco Switch and Router &#8211; Technig</figcaption></figure>
<div class="ad x2">
<h2 id="article_page_content_ad" class="du-ad-region row"> Configure Banner MOTD on Cisco Switch and Router</h2>
<div>
<p>To configure each of these banners and set them up on your switch, follow these commands:</p>
</div>
</div>
<pre class="code">SW1#enable 
SW1#configure terminal 
Enter configuration commands, one per line. End with CNTL/Z.
SW1(config)#banner motd #Admin Access only!#
SW1(config)#</pre>
<p>Now, the Motd banner has configured on a Cisco switch. Let&#8217;s test it what is going on?</p>
<pre class="nums:false lang:default decode:true">Press RETURN to get started!
Admin Access Only
User Access Verification
Password: 
</pre>
<p>Yes, you can see the message that prompts you before user authentication.</p>
<h3>Related Search Queries:</h3>
<p>Motd banner examples<br />
Cisco MOTD banner ASCII art<br />
Why should every switch have a motd banner?<br />
Show banner motd<br />
Cisco banner motd examples<br />
Banner motd packet tracer<br />
Cisco banner motd multiple lines<br />
Banner exec</p>
<p>The post <a href="https://www.technig.com/how-to-configure-banner-motd-on-cisco-switch-and-router/">How to Configure Banner MOTD on Cisco Switch and Router?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/how-to-configure-banner-motd-on-cisco-switch-and-router/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14609</post-id>	</item>
		<item>
		<title>How to Configure PAP and CHAP in Cisco Router?</title>
		<link>https://www.technig.com/configure-pap-and-chap-in-cisco-router/</link>
					<comments>https://www.technig.com/configure-pap-and-chap-in-cisco-router/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Thu, 03 May 2018 11:27:16 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Certification]]></category>
		<category><![CDATA[CCNA Lab Manual]]></category>
		<category><![CDATA[CCNA Packet Tracer Lab]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=14577</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="841" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="How to Configure PAP and CHAP in Cisco Router - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg 841w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig-768x384.jpg 768w" sizes="(max-width: 841px) 100vw, 841px" /></div>
<p>It&#8217;s a simple way you can learn to configure PAP and CHAP in Cisco router using this packet tracer lab. Just download the lab or create your own lab with packet tracer and follow the instruction to easy configure PAP and CHAP authentication protocols in a Cisco router. Configure PAP and CHAP in Cisco Router [&#8230;]</p>
<p>The post <a href="https://www.technig.com/configure-pap-and-chap-in-cisco-router/">How to Configure PAP and CHAP in Cisco Router?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="841" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="How to Configure PAP and CHAP in Cisco Router - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg 841w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig-768x384.jpg 768w" sizes="(max-width: 841px) 100vw, 841px" /></div><p>It&#8217;s a simple way you can learn to configure PAP and CHAP in Cisco router using this packet tracer lab. Just download the lab or create your own lab with packet tracer and follow the instruction to easy configure PAP and CHAP authentication protocols in a Cisco router.</p>
<figure id="attachment_14578" aria-describedby="caption-attachment-14578" style="width: 1024px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/05/Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg"><img loading="lazy" decoding="async" class="wp-image-14578 size-full" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg" alt="Configure PAP and CHAP in Cisco Router - Technig" width="1024" height="432" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg 1024w, https://www.technig.com/wp-content/uploads/2018/05/Configure-PAP-and-CHAP-in-Cisco-Router-Technig-300x127.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-PAP-and-CHAP-in-Cisco-Router-Technig-768x324.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption id="caption-attachment-14578" class="wp-caption-text">Configure PAP and CHAP in Cisco Router &#8211; Technig</figcaption></figure>
<h2>Configure PAP and CHAP in Cisco Router</h2>
<p>In this activity, you will practice configuring PPP encapsulation on serial links. You will also configure PPP PAP<br />
authentication and PPP CHAP authentication.</p>
<h3><strong>Part 1:</strong> Review Routing Configurations</h3>
<p><strong>Step 1:</strong> View running configurations on all routers.</p>
<ul>
<li>While reviewing the router configurations, note the use of both static and dynamic routes in the topology.</li>
</ul>
<p><strong>Step 2:</strong> Test connectivity between computers and the web server.</p>
<ul>
<li>From PC and Laptop, ping the web server at 209.165.200.2. Both ping commands should be successful.<br />
Remember to give enough time for STP and EIGRP to converge.</li>
</ul>
<h3><strong>Part 2:</strong> Configure PPP as the Encapsulation Method</h3>
<p><strong>Step 1:</strong> Configure R1 to use PPP encapsulation with R3.</p>
<p>Enter the following commands on R1:</p>
<pre class="nums:false lang:default decode:true">R1(config)# interface s0/0/0
R1(config-if)# encapsulation ppp</pre>
<p><strong>Step 2:</strong> Configure R2 to use PPP encapsulation with R3.</p>
<p>Enter the appropriate commands on R2:</p>
<pre class="nums:false lang:default decode:true ">R2(config)# interface s0/0/1
R2(config-if)# encapsulation ppp</pre>
<p><strong>Step 3:</strong> Configure R3 to use PPP encapsulation with R1, R2, and ISP.</p>
<p>Enter the appropriate commands on R3:</p>
<pre class="nums:false lang:default decode:true">R3(config)# interface s0/0/0
R3(config-if)# encapsulation ppp
R3(config)# interface s0/0/1
R3(config-if)# encapsulation ppp
R3(config)# interface s0/1/0
R3(config-if)# encapsulation ppp</pre>
<p><strong>Step 4:</strong> Configure ISP to use PPP encapsulation with R3.</p>
<p><strong>a.</strong> Click the Internet cloud, then ISP. Enter the following commands:</p>
<pre class="nums:false lang:default decode:true ">Router(config)# interface s0/0/0
Router(config-if)# encapsulation ppp</pre>
<p><strong>b.</strong> Exit the Internet cloud by clicking Back in the upper left corner or by pressing Alt+left arrow.</p>
<p><strong>Step 5:</strong> Test connectivity to the web server.</p>
<p>PC and Laptop should be able to ping the web server at 209.165.200.2. This may take some time as<br />
interfaces start working again and EIGRP reconverges.</p>
<h3><strong>Part 3:</strong> Configure PPP Authentication</h3>
<p><strong>Step 1:</strong> Configure PPP PAP Authentication Between R1 and R3.</p>
<p><strong>Note:</strong> Instead of using the keyword password as shown in the curriculum, you will use the keyword secret to<br />
provide a better encryption of the password.</p>
<p><strong>a.</strong> Enter the following commands into R1:</p>
<pre class="nums:false lang:default decode:true ">R1(config)# username R3 secret class
R1(config)# interface s0/0/0
R1(config-if)# ppp authentication pap
R1(config-if)# ppp pap sent-username R1 password cisco</pre>
<p><strong>b.</strong> Enter the following commands into R3:</p>
<pre class="nums:false lang:default decode:true ">R3(config)# username R1 secret cisco
R3(config)# interface s0/0/0
R3(config-if)# ppp authentication pap
R3(config-if)# ppp pap sent-username R3 password class</pre>
<p><strong>Step 2:</strong> Configure PPP PAP Authentication Between R2 and R3.</p>
<p>Repeat step 1 to configure authentication between R2 and R3 changing the usernames as needed. Note that<br />
each password sent to each serial port matches the password expected by the opposite router.</p>
<pre class="nums:false lang:default decode:true ">R2(config-if)# username R3 secret class
R2(config)# interface s0/0/1
R2(config-if)# ppp authentication pap
R2(config-if)# ppp pap sent-username R2 password cisco</pre>
<pre class="nums:false lang:default decode:true ">R3(config-if)# username R2 secret cisco
R3(config)# interface s0/0/1
R3(config-if)# ppp authentication pap
R3(config-if)# ppp pap sent-username R3 password class</pre>
<h3><strong>Step 3:</strong> Configure PPP CHAP Authentication Between R3 and ISP</h3>
<p><strong>a.</strong> Enter the following commands into ISP. The hostname is sent as the username:</p>
<pre class="nums:false lang:default decode:true ">Router(config)# hostname ISP
ISP(config)# username R3 secret cisco
ISP(config)# interface s0/0/0
ISP(config-if)# ppp authentication chap</pre>
<p><strong>b.</strong> Enter the following commands into R3. The passwords must match for CHAP authentication:</p>
<pre class="nums:false lang:default decode:true ">R3(config)# username ISP secret cisco
R3(config)# interface serial0/1/0
R3(config-if)# ppp authentication chap</pre>
<p><strong>Step 4:</strong> Test connectivity between computers and the web server.</p>
<p>From PC and Laptop, ping the web server at 209.165.200.2. Both ping commands should be successful.<br />
Remember to give enough time for STP and EIGRP to converge.</p>
<p><strong>Step 4:</strong> Test connectivity between computers and the web server.</p>
<p>From PC and Laptop, ping the web server at 209.165.200.2. Both ping commands should be successful.<br />
Remember to give enough time for STP and EIGRP to converge.</p>
<p><strong>Note:</strong> This is the Cisco Network Academy lab, you can join the netacad.com website to learn the entire CCNA.</p>
<p><strong>Download the Lab:</strong> <a href="https://www.technig.com/wp-content/uploads/2018/05/2.3.2.6-Packet-Tracer-Configuring-PAP-and-CHAP-Authentication.zip" target="_blank" rel="noopener noreferrer">PAP and CHAP Configuration</a> or <a href="https://www.technig.com/tag/ccna-packet-tracer-lab/" target="_blank" rel="noopener noreferrer">CCNA Packet Tracer Lab</a></p>
<p>That is all you need to learn to configure PAP and CHAP in Cisco Router. Let&#8217;s see what is the difference between PAP and CHAP authentication protocols?</p>
<h2>What is the Difference Between PAP and CHAP?</h2>
<p>The password authentication protocol (PAP) and challenge handshake authentication protocol (CHAP) are both used to authenticate PPP sessions and can be used with many VPNs. Basically, PAP works like a standard login procedure; the remote system authenticates itself to the user a static username and password combination. The password can be encrypted for additional security, but PAP is subject to numerous attacks. In particular, since the information is static, it is subject to password guessing as well as snooping.</p>
<p>CHAP takes a more sophisticated and secure approach to authentication by creating a unique challenge phrase (a randomly generated string) for each authentication. The challenge phrase is combined with device hostnames using one-way hashing functions to authenticate in a way where no static secret information is ever transmitted over the wire. Because all transmitted information is dynamic, CHAP is significantly more robust than PAP.</p>
<p>Another advantage of CHAP over PAP is that CHAP can be set up to do repeated midsession authentications. This is useful for dial-up PPP sessions and other sessions where a port may be left open even though the remote device has disconnected. In this case, its possible for someone else to pick up the connection mid-session simply by establish physical connectivity.</p>
<h3>Related Search:</h3>
<ul>
<li>PPP pap configuration</li>
<li>PPP chap configuration</li>
<li>Configure chap authentication on s0/0/0</li>
<li>pap chap configuration</li>
</ul>
<p>The post <a href="https://www.technig.com/configure-pap-and-chap-in-cisco-router/">How to Configure PAP and CHAP in Cisco Router?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/configure-pap-and-chap-in-cisco-router/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14577</post-id>	</item>
		<item>
		<title>Configure Inter VLAN Routing on Cisco Router and Layer 3 Switches</title>
		<link>https://www.technig.com/configure-inter-vlan-routing-cisco-router/</link>
					<comments>https://www.technig.com/configure-inter-vlan-routing-cisco-router/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Thu, 01 Jun 2017 04:58:04 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Lab Manual]]></category>
		<category><![CDATA[CCNA Packet Tracer Lab]]></category>
		<category><![CDATA[Cisco Router Configuration]]></category>
		<category><![CDATA[Configure VLAN]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Inter VLAN Routing]]></category>
		<category><![CDATA[Packet Tracer Lab]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=2449</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Inter VLAN Routing" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing.jpg 840w, https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>A complete guide to configure Inter VLAN Routing on Cisco Router and Layer 3 switch to learn inter VLAN routing. </p>
<p>The post <a href="https://www.technig.com/configure-inter-vlan-routing-cisco-router/">Configure Inter VLAN Routing on Cisco Router and Layer 3 Switches</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Inter VLAN Routing" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing.jpg 840w, https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>A step by step guide to configure Inter-VLAN Routing on the Cisco router or layer 3 switches. Basically, on a VLAN, no host can communicate with hosts within other VLANs. It means only hosts that are members of the same VLAN can communicate with each other. So if you want your VLANs hosts can communicate with each other, you must configure inter-VLAN routing using a router or a layer 3 switch. Here we completely demonstrate the Inter-VLAN configuration using a Cisco router and a layer 3 switch.</p>
<p>The router you are using for Inter-VLAN routing must be compatible and support <a href="https://en.wikipedia.org/wiki/Cisco_Inter-Switch_Link" target="_blank" rel="noopener noreferrer">Inter-Switch Link</a> (ISL) which is a Cisco Systems proprietary protocol, and IEEE 802.1q frame format for routing on the Fast Ethernet interfaces. In Inter-VLAN the physical Fast Ethernet interface of the router is divided into sub-Interfaces for each VLAN. You can set IP address for each sub-Interface in order to route between VLANs.</p>
<figure id="attachment_2450" aria-describedby="caption-attachment-2450" style="width: 840px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing.jpg"><img loading="lazy" decoding="async" class="wp-image-2450 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing.jpg" alt="Configure Inter VLAN Routing" width="840" height="420" srcset="https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing.jpg 840w, https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></a><figcaption id="caption-attachment-2450" class="wp-caption-text">Configure Inter VLAN Routing</figcaption></figure>
<h2>How to Create VLAN on Cisco Switches?</h2>
<p>Let&#8217;s configure it on the below Inter-VLAN routing Lab. Download the Packet Tracer <a href="https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing-Technig.zip" target="_blank" rel="noopener noreferrer">Inter-VLAN routing</a> Lab for CCNA or create your own Lab.</p>
<p><strong>1.</strong> First of all, create two VLAN in the switch and named VLAN A and VLAN B with the following command.</p>
<pre class="toolbar:2 nums-toggle:true lang:default decode:true">Switch&gt;enable 
Switch#configure terminal 
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#vlan 2
Switch(config-vlan)#name VLAN-A
Switch(config-vlan)#vlan 3
Switch(config-vlan)#name VLAN-B
Switch(config-vlan)#exit</pre>
<p><strong>2.</strong> OK, the VLANs A and B are created successfully. Now check them with &#8220;<strong>show vlan</strong>&#8221; command.</p>
<figure id="attachment_2457" aria-describedby="caption-attachment-2457" style="width: 563px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/Inter-VLAN-Routing.jpg"><img loading="lazy" decoding="async" class="wp-image-2457 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/Inter-VLAN-Routing.jpg" alt="Inter-VLAN Routing" width="563" height="271" srcset="https://www.technig.com/wp-content/uploads/2015/04/Inter-VLAN-Routing.jpg 563w, https://www.technig.com/wp-content/uploads/2015/04/Inter-VLAN-Routing-300x144.jpg 300w" sizes="(max-width: 563px) 100vw, 563px" /></a><figcaption id="caption-attachment-2457" class="wp-caption-text">Configure Inter-VLAN Routing</figcaption></figure>
<p><strong>3.</strong> You see the result in the screenshot, the VLANs are ready for assigning switch ports to them.</p>
<h2>Assigning Switch Ports for VLANs</h2>
<p>In this section, the switch ports are divide and assign to VLANs. Before configuring Inter-VLAN routing, a host in a VLAN can only communicate within its own VLAN and not reach to other VLANs. So let&#8217;s configure it.</p>
<p><strong>1.</strong> Try to assign switch ports for each VLANs with the following commands.</p>
<figure id="attachment_2459" aria-describedby="caption-attachment-2459" style="width: 278px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/Assigning-Switch-Ports-to-VLANs.jpg"><img loading="lazy" decoding="async" class="wp-image-2459 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/Assigning-Switch-Ports-to-VLANs.jpg" alt="Assigning Switch Ports to VLANs" width="278" height="189" /></a><figcaption id="caption-attachment-2459" class="wp-caption-text">Assigning Switch Ports to VLANs</figcaption></figure>
<pre class="toolbar:2 nums-toggle:true lang:default decode:true">Switch(config)#interface fastEthernet 0/2
Switch(config-if)#switchport mode access 
Switch(config-if)#switchport access vlan 2
Switch(config-if)#exit
Switch(config)#
Switch(config)#interface fastEthernet 0/5
Switch(config-if)#switchport mode access 
Switch(config-if)#switchport access vlan 2
Switch(config-if)#exit</pre>
<p><strong>2.</strong> Now the port <strong>FastEthernet 0/2</strong> and <strong>FastEthernet 0/5</strong> are members of <strong>VLAN 2</strong> which named <strong>VLAN-A</strong>. Go to set the PC3 and PC2 to <strong>VLAN-B</strong>.</p>
<p><strong>3.</strong> Let&#8217;s assign a range of ports to a VLAN using &#8220;<strong>interface range</strong>&#8221; command.</p>
<pre class="toolbar:2 nums-toggle:true lang:default decode:true">Switch(config)#interface range fastEthernet 0/3-4
Switch(config-if-range)#switchport mode access 
Switch(config-if-range)#switchport access vlan 3
Switch(config-if-range)#exit</pre>
<p><strong>Note: </strong>The <strong>interface range</strong> command can assign a range of interfaces to a VLAN. Read more about basic VLAN configuration on &#8220;<a href="https://www.technig.com/configure-vlan-cisco-switches/" target="_blank" rel="noopener noreferrer">Configure VLAN on Cisco Switches Using Cisco Packet Tracer</a>&#8221; post.</p>
<figure id="attachment_2461" aria-describedby="caption-attachment-2461" style="width: 570px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/Assign-Switch-Ports-to-VLAN.jpg"><img loading="lazy" decoding="async" class="wp-image-2461 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/Assign-Switch-Ports-to-VLAN.jpg" alt="Assign Switch Ports to VLAN" width="570" height="257" srcset="https://www.technig.com/wp-content/uploads/2015/04/Assign-Switch-Ports-to-VLAN.jpg 570w, https://www.technig.com/wp-content/uploads/2015/04/Assign-Switch-Ports-to-VLAN-300x135.jpg 300w" sizes="(max-width: 570px) 100vw, 570px" /></a><figcaption id="caption-attachment-2461" class="wp-caption-text">Assign Switch Ports to VLAN</figcaption></figure>
<p><strong>4.</strong> Now we have just done the basic VLAN configuration like creating VLAN and assigning switch ports to VLANs. Let&#8217;s enable Trunking mode on the switch port to the router and then configure Inter-VLAN routing on the router.</p>
<h2>Configure Trunking Ports on Switch</h2>
<p>With the command &#8220;<strong>switch port mode trunk</strong>&#8221; you can configure trunking on the <strong>FastEthernet 0/1</strong> port of the <strong>SW1</strong>. The <strong>VLAN Trunking Protocol</strong> (VTP) let the VLANs transmit theirs traffics over a physical line simultaneously. Read more about <strong><a href="https://en.wikipedia.org/wiki/VLAN_Trunking_Protocol" target="_blank" rel="noopener noreferrer">VTP</a> </strong>on Wikipedia website.</p>
<figure id="attachment_2466" aria-describedby="caption-attachment-2466" style="width: 249px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/Configuring-Trunk-Ports.jpg"><img loading="lazy" decoding="async" class="wp-image-2466 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/Configuring-Trunk-Ports.jpg" alt="Configuring Trunk Ports" width="249" height="157" /></a><figcaption id="caption-attachment-2466" class="wp-caption-text">Configuring Trunk Ports</figcaption></figure>
<p><strong>1.</strong> Just navigate to <strong>FastEthernet 0/1</strong> interface and type &#8220;<strong>switchport mode trunk</strong>&#8220;<strong> </strong>the press enter to enable trunking on <strong>Fa0/1</strong> interface line.</p>
<pre class="toolbar:2 nums-toggle:true lang:default decode:true">Switch(config)#interface fastEthernet 0/1
Switch(config-if)#switchport mode trunk 
Switch(config-if)#</pre>
<p><strong>2.</strong> Now the VLANs can transmit traffic over the <strong>FastEthernet 0/1</strong> without any problems.</p>
<p><strong>Note:</strong> Try to enable trunking mode only to interface between to switch or router devices. It&#8217;s not necessary to enable it on the interface of the switch to PC.</p>
<h2>Configure Inter-VLAN Routing on Cisco Router</h2>
<p>Finally, the lab is ready to configure Inter-VLAN routing. If you test the PCs, they can ping with each other within a VLAN but not with other VLANs. So in order to communicate they need routing. Not network routing protocols such as <strong><a href="https://www.technig.com/ccna-configure-static-routing-in-cisco-packet-tracer/" target="_blank" rel="noopener noreferrer">Static routing</a></strong> or dynamic routing like <strong><a href="https://www.technig.com/configure-routing-information-protocol/" target="_blank" rel="noopener noreferrer">RIP</a></strong>, and <strong><a href="https://www.technig.com/configure-ospf-routing-protocol/" target="_blank" rel="noopener noreferrer">OSPF</a></strong>. Just need Inter-VLAN Routing which you simply configure according to below step by step Inter-VLAN routing guide.</p>
<p><strong>1.</strong> Try to assign an IP address to the router and enable the interface you want to configure inter-VLAN routing.</p>
<figure id="attachment_2470" aria-describedby="caption-attachment-2470" style="width: 275px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/VLAN-Routing.jpg"><img loading="lazy" decoding="async" class="wp-image-2470 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/VLAN-Routing.jpg" alt="VLAN Routing" width="275" height="130" /></a><figcaption id="caption-attachment-2470" class="wp-caption-text">VLAN Routing</figcaption></figure>
<pre class="toolbar:2 nums-toggle:true lang:default decode:true">Router&gt;enable 
Router#configure terminal 
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface fastEthernet 0/0
Router(config-if)#ip address 192.168.10.1 255.255.255.248
Router(config-if)#no shutdown</pre>
<p><strong>2.</strong> Good, the IP <strong>192.168.10.1</strong> with the subnet mask of <strong>255.255.255.248</strong> is assigned for physical <strong>FastEthernet 0/0</strong> interface.</p>
<p><strong>Note: </strong>We need to have subinterface for each VLANs on the router. The subinterface is a virtual interface card that inter-VLAN doing routing using them.</p>
<p><strong>3.</strong> Now try to create a subinterface for each VLAN with <strong>interface</strong> command and assign IP address from the different network for each VLAN. In this case, I have subnetted the<strong> 192.168.10.0/24</strong> IP address to <strong>3</strong> networks.</p>
<pre class="toolbar:2 nums-toggle:true lang:default decode:true">Router(config)#interface fastEthernet 0/0.2
Router(config-subif)#
Router(config-subif)#encapsulation dot1Q 2
Router(config-subif)#ip address 192.168.10.9 255.255.255.248
Router(config-subif)#</pre>
<p><strong>4.</strong> See the result with &#8220;<strong>do show ip interface brief</strong>&#8221; from sub-interface area.</p>
<figure id="attachment_2471" aria-describedby="caption-attachment-2471" style="width: 618px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/Create-Sub-Interface.jpg"><img loading="lazy" decoding="async" class="wp-image-2471 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/Create-Sub-Interface.jpg" alt="Create Sub-Interface" width="618" height="133" srcset="https://www.technig.com/wp-content/uploads/2015/04/Create-Sub-Interface.jpg 618w, https://www.technig.com/wp-content/uploads/2015/04/Create-Sub-Interface-300x65.jpg 300w" sizes="(max-width: 618px) 100vw, 618px" /></a><figcaption id="caption-attachment-2471" class="wp-caption-text">Create Sub-Interface</figcaption></figure>
<p>The virtual sub-interface <strong>FastEthernet0/0.2</strong> has created and it has the 192.168.10.9 IP address. This sub-interface act as a default gateway for VLAN-A with an address of <strong>192.168.10.8/29</strong>.</p>
<p><strong>5.</strong> Do the same to create a sub-interface for VLAN-B also.</p>
<pre class="toolbar:2 nums-toggle:true lang:default decode:true">Router(config)#interface fastEthernet 0/0.3
Router(config-subif)#ip address 192.168.10.17 255.255.255.248

% Configuring IP routing on a LAN subinterface is only allowed if that
subinterface is already configured as part of an IEEE 802.10, IEEE 802.1Q,
or ISL vLAN.

Router(config-subif)#encapsulation dot1Q 3
Router(config-subif)#ip address 192.168.10.17 255.255.255.248
Router(config-subif)#</pre>
<p><strong>6.</strong> Everything is fine, but you see the error with red colour! It is because we forgot to set the <strong>encapsulation dot1Q</strong> command. Before assigning an IP address to a sub-interface, you should set IEEE 802.1q with <strong>encapsulation</strong> command.</p>
<p>Finally, all VLANs hosts can communicate with each other. That&#8217;s all you need to configure Inter-VLAN routing on your corporate network. Download the complete Lab of <a href="https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing.zip" target="_blank" rel="noopener noreferrer">Inter-VLAN routing</a> Cisco Packet Tracer Lab. Follow the below steps if you want to configure inter-VLAN on Layer 3 Switches or troubleshooting inter-VLAN on routers and switches.</p>
<h2>Configure Inter-VLAN Using Layer 3 Switches</h2>
<p>Work the same, just need a Cisco Layer 3 switch. To configure Inter-VLAN on a Layer 3 switch, you must assign an IP address to VLANs instead of sub-interfaces. Assigning an IP address to VLAN is easy, only read the &#8220;<strong>Assigning IP address to VLAN</strong>&#8221; section at the end of this articles.</p>
<p>To configure Inter-VLAN routing using layer 3 switches, you don&#8217;t need router anymore. All configuration has done within the layer 3 switch.</p>
<h2>Troubleshooting and Assigning IP address to VLANs</h2>
<p>As this post is related to configure Inter-VLAN routing, so we must do some more about VLAN configuration such as assigning IP address to VLANs, controlling VLANs remotely with Telnet, and some essential troubleshooting commands.</p>
<h3>How to Assign an IP address to VLANs?</h3>
<p>In order to assign an IP address to a VLAN, simply go to VLAN and set the IP address like assigning IP address to an interface of a router.</p>
<pre class="toolbar:2 nums-toggle:true lang:default decode:true">Switch(config)#interface vlan 1
Switch(config-if)#ip address 192.168.10.4 255.255.255.248
Switch(config-if)#no shutdown</pre>
<p>Check it with &#8220;<strong>do show ip interface brief</strong>&#8221; command, whether the default <strong>VLAN 1</strong> has gotten the IP address of <strong>192.168.10.4/29</strong> or not.</p>
<figure id="attachment_2472" aria-describedby="caption-attachment-2472" style="width: 550px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/Default-VLAN-1.jpg"><img loading="lazy" decoding="async" class="wp-image-2472 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/Default-VLAN-1.jpg" alt="Default VLAN 1" width="550" height="45" srcset="https://www.technig.com/wp-content/uploads/2015/04/Default-VLAN-1.jpg 550w, https://www.technig.com/wp-content/uploads/2015/04/Default-VLAN-1-300x25.jpg 300w" sizes="(max-width: 550px) 100vw, 550px" /></a><figcaption id="caption-attachment-2472" class="wp-caption-text">Default VLAN 1 &#8211; Configure Inter-VLAN Routing</figcaption></figure>
<p>Yes, that&#8217;s fine. This can help you remotely configure VLANs through the internet or network.</p>
<h3>Troubleshooting Inter-VLAN Routing</h3>
<p>To see the VLANs on a switch, type the &#8220;<strong>show vlan</strong>&#8221; command. This command will list all created VLANs within a switch.</p>
<p>The &#8220;<strong>show interface trunk</strong>&#8221; command shows encapsulation and trunking status.</p>
<p>The &#8220;<strong>show interfaces fastEthernet 0/1 switchport</strong>&#8221; display the status of a specific switch port. See the result on the screenshot.</p>
<figure id="attachment_2473" aria-describedby="caption-attachment-2473" style="width: 404px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/Encapsulation-Status.jpg"><img loading="lazy" decoding="async" class="wp-image-2473 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/Encapsulation-Status.jpg" alt="Configure Inter-VLAN routing - Encapsulation Status" width="404" height="343" srcset="https://www.technig.com/wp-content/uploads/2015/04/Encapsulation-Status.jpg 404w, https://www.technig.com/wp-content/uploads/2015/04/Encapsulation-Status-300x255.jpg 300w" sizes="(max-width: 404px) 100vw, 404px" /></a><figcaption id="caption-attachment-2473" class="wp-caption-text">Configure Inter-VLAN routing &#8211; Encapsulation Status</figcaption></figure>
<p>OK, I think it&#8217;s enough for Configuring Inter-VLAN routing. I hope you find this configure Inter-VLAN routing article&#8217;s helpful and if you have any problem or question regarding this article, ask us through the comment section.</p>
<p>The post <a href="https://www.technig.com/configure-inter-vlan-routing-cisco-router/">Configure Inter VLAN Routing on Cisco Router and Layer 3 Switches</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/configure-inter-vlan-routing-cisco-router/feed/</wfw:commentRss>
			<slash:comments>15</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2449</post-id>	</item>
	</channel>
</rss>
