#FreeLabFriday: Packet Tracer Assessment Lab: STP Configuration, Optimization and Layer 2 Protection

Free Lab Guide: http://bit.ly/2q1lMad
Free Packet Tracer Labs (version 7.2): http://bit.ly/2NQPAQd
#FreeLabFriday – Implementing Spanning-Tree, STP Optimization and Layer 2 Protection Features.
If you like FREE Lab Friday, you can get the Packet Tracer course for only $10 on Udemy here: http://bit.ly/PacketTracerLabGuides
On GNS3 Academy, get the course here for $10: http://bit.ly/2NTIuiT
Get my ICND1 and ICND2 courses for $10 here: https://goo.gl/XR1xm9 (you will get ICND2 as a free bonus when you buy the ICND1 course).

Packet Tracer File: Free Lab Friday – Configuring Enterprise STP.pka
Access Credentials:
User Exec: cisco
Privilege Exec: cisco

In this Lab exercise, Tyrell Corporation have requested that the recently deployed layer 2 environment be optimised. The initial layer 2 Local VLAN and Trunking configurations unique to each device have been applied.
You are tasked with configuring STP, STP optimization and Layer 2 protection features in this scenario. When you have completed the tasks, you will be able to Check Results

1. Ensure that the Distribution Switches are the root of the Layer 2 networks
a. DSW1 should be the Root Bridge for VLANs 1,11-14 and 99, while DSW2 provides the backup Root Bridge for these VLANs
b. DSW2 should be the Root Bridge for VLANs 31-34, while DSW1 provides the backup Root Bridge for these VLANs
c. The Root Bridges priority should be 8192 lower than the default, while the Backup Root Bridge priority should be 4096 lower than the default
2. A convergence event should be contained within the 1-2 second timeframe
3. All trunk links should have an explicit configuration that overrides any misconfiguration of duplex for fast convergence.
4. All Trunk links should implement a control mechanism that prevents broadcast from consuming more than 20 percent of uplink bandwidth
5. All active host-facing ports should implement a control mechanism that prevents broadcast from consuming more than 40 percent of interface bandwidth
6. All active host-facing ports should move to the forwarding state immediately. However, these ports must be protected from any attempt by rogue devices to alter the spanning-tree.
7. Host-facing ports should only be allowed to learn one mac address dynamically per port. This should be written to the running-configuration. Host-facing ports should remain active at all time, but these ports should log any attempts by any other mac address to connect to the network and increment a security counter on each attempt.


Share this

© Copyright 2018 Network Experts Internet Ltd | All rights reserved | Terms of Use | Contact