<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>CCNA on 知识带给我们自由</title>
    <link>https://yuexuan521.github.io/zh/tags/ccna/</link>
    <description>Recent content in CCNA on 知识带给我们自由</description>
    <image>
      <title>知识带给我们自由</title>
      <url>https://yuexuan521.github.io/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</url>
      <link>https://yuexuan521.github.io/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</link>
    </image>
    <generator>Hugo -- 0.160.1</generator>
    <language>en-us</language>
    <copyright>See this site&amp;rsquo;s source code here, licensed under GPLv3 ·</copyright>
    <lastBuildDate>Thu, 23 Jan 2025 12:48:24 +0000</lastBuildDate>
    <atom:link href="https://yuexuan521.github.io/zh/tags/ccna/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Packet Tracer - Configure AAA Authentication on Cisco Routers（在思科路由器上配置 AAA 认证）</title>
      <link>https://yuexuan521.github.io/zh/posts/packet-tracer-configure-aaa-authentication-on-cisco-routers%E5%9C%A8%E6%80%9D%E7%A7%91%E8%B7%AF%E7%94%B1%E5%99%A8%E4%B8%8A%E9%85%8D%E7%BD%AE-aaa-%E8%AE%A4%E8%AF%81/</link>
      <pubDate>Thu, 23 Jan 2025 12:48:24 +0000</pubDate>
      <guid>https://yuexuan521.github.io/zh/posts/packet-tracer-configure-aaa-authentication-on-cisco-routers%E5%9C%A8%E6%80%9D%E7%A7%91%E8%B7%AF%E7%94%B1%E5%99%A8%E4%B8%8A%E9%85%8D%E7%BD%AE-aaa-%E8%AE%A4%E8%AF%81/</guid>
      <description>&lt;h2 id=&#34;packet-tracer---在思科路由器上配置-aaa-认证&#34;&gt;Packet Tracer - 在思科路由器上配置 AAA 认证&lt;/h2&gt;
&lt;h3 id=&#34;地址表&#34;&gt;地址表&lt;/h3&gt;
&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212534006.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212534006.png&#34; 
             alt=&#34;在这里插入图片描述&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;h3 id=&#34;目标&#34;&gt;目标&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;在R1上配置本地用户账户，并使用本地AAA进行控制台和vty线路的身份验证。&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;从R1控制台和PC-A客户端验证本地AAA身份验证功能。&lt;/p&gt;</description>
      <content:encoded><![CDATA[<h2 id="packet-tracer---在思科路由器上配置-aaa-认证">Packet Tracer - 在思科路由器上配置 AAA 认证</h2>
<h3 id="地址表">地址表</h3>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212534006.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212534006.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="目标">目标</h3>
<ul>
<li>
<p>在R1上配置本地用户账户，并使用本地AAA进行控制台和vty线路的身份验证。</p>
</li>
<li>
<p>从R1控制台和PC-A客户端验证本地AAA身份验证功能。</p>
</li>
<li>
<p>配置基于服务器的AAA身份验证，采用TACACS+协议。</p>
</li>
<li>
<p>从PC-B客户端验证基于服务器的AAA（TACACS+）身份验证。</p>
</li>
<li>
<p>配置基于服务器的AAA身份验证，采用RADIUS协议。</p>
</li>
<li>
<p>从PC-C客户端验证基于服务器的AAA（RADIUS）身份验证。</p>
</li>
</ul>
<h3 id="背景场景">背景/场景</h3>
<p>网络拓扑图显示了路由器R1、R2和R3。目前，所有管理安全性都基于enable secret密码。您的任务是配置并测试本地及基于服务器的AAA解决方案。</p>
<p>您将在路由器R1上创建一个本地用户账户，并配置本地AAA以测试控制台和vty登录：</p>
<ul>
<li>
<p>用户账户：Admin1，密码admin1pa55
接下来，将配置路由器R2以支持通过TACACS+协议实现的基于服务器的身份验证。TACACS+服务器已经预先配置了以下信息：</p>
</li>
<li>
<p>客户端：R2，关键字为tacacspa55</p>
</li>
<li>
<p>用户账户：Admin2，密码admin2pa55
最后，您将配置路由器R3以支持通过RADIUS协议实现的基于服务器的身份验证。RADIUS服务器已预先配置如下信息：</p>
</li>
<li>
<p>客户端：R3，关键字为radiuspa55</p>
</li>
<li>
<p>用户账户：Admin3，密码admin3pa55
此外，路由器还预配置了以下内容：</p>
</li>
<li>
<p>启用秘密密码：ciscoenpa55</p>
</li>
<li>
<p>使用MD5认证的OSPF路由协议，密码为：MD5pa55
注意：控制台和vty线路尚未预先配置。</p>
</li>
</ul>
<p>注意：尽管IOS版本15.3使用了更为安全的加密哈希算法SCRYPT，但在Packet Tracer当前支持的IOS版本中仍使用MD5。请始终在您的设备上使用最安全的选项。</p>
<hr>
<h3 id="第一部分在r1上配置本地aaa认证以实现控制台访问">第一部分：在R1上配置本地AAA认证以实现控制台访问</h3>
<p><strong>步骤1：测试连通性</strong></p>
<ul>
<li>
<p>从PC-A向PC-B执行Ping操作。</p>
</li>
<li>
<p>从PC-A向PC-C执行Ping操作。</p>
</li>
<li>
<p>从PC-B向PC-C执行Ping操作。</p>
</li>
</ul>
<p><strong>步骤2：在R1上配置本地用户名</strong></p>
<ul>
<li>在R1上配置一个名为 <strong>Admin1</strong> 的用户名，设置秘密密码为 <strong>admin1pa55</strong> 。</li>
</ul>
<blockquote>
<p>R1(config)# username Admin1 secret admin1pa55</p>
</blockquote>
<p><strong>步骤3：在R1上为控制台访问配置本地AAA认证</strong></p>
<ul>
<li>在R1上启用AAA功能，并配置控制台登录时使用本地数据库进行AAA身份验证。</li>
</ul>
<blockquote>
<p>R1(config)# aaa new-model
R1(config)# aaa authentication login default local</p>
</blockquote>
<p><strong>步骤4：配置控制台线路使用定义的AAA认证方法</strong></p>
<ul>
<li>在R1上针对控制台登录启用AAA，并配置其使用默认方法列表进行AAA身份验证。</li>
</ul>
<blockquote>
<p>R1(config)# line console 0
R1(config-line)# login authentication default</p>
</blockquote>
<p><strong>步骤5：验证AAA认证方法</strong></p>
<ul>
<li>使用本地数据库验证用户EXEC登录过程。</li>
</ul>
<p>通过以上配置后，可以在R1的控制台上用Admin1账户和对应的密码admin1pa55进行登录，验证本地AAA身份验证是否生效。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212536693.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212536693.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="第二部分在r1上配置本地aaa认证以实现vty线路访问">第二部分：在R1上配置本地AAA认证以实现vty线路访问</h3>
<p><strong>步骤1：配置域名和加密密钥以配合SSH使用</strong>
a. 在R1上将 <strong>ccnasecurity.com</strong> 设置为域名。
b. 创建一个1024位的RSA加密密钥。</p>
<blockquote>
<p>R1(config)#ip domain-name ccnasecurity.com
R1(config)# crypto key generate rsa</p>
</blockquote>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span><span class="lnt">4
</span><span class="lnt">5
</span><span class="lnt">6
</span><span class="lnt">7
</span><span class="lnt">8
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-shell" data-lang="shell"><span class="line"><span class="cl">R1<span class="o">(</span>config<span class="o">)</span><span class="c1"># crypto key generate rsa</span>
</span></span><span class="line"><span class="cl">The name <span class="k">for</span> the keys will be: R3.ccnasecurity.com
</span></span><span class="line"><span class="cl">Choose the size of the key modulus in the range of <span class="m">360</span> to <span class="m">2048</span> <span class="k">for</span> your
</span></span><span class="line"><span class="cl">General Purpose Keys. Choosing a key modulus greater than <span class="m">512</span> may take
</span></span><span class="line"><span class="cl">a few minutes.
</span></span><span class="line"><span class="cl"> 
</span></span><span class="line"><span class="cl">How many bits in the modulus <span class="o">[</span>512<span class="o">]</span>: <span class="m">1024</span>
</span></span><span class="line"><span class="cl">% Generating <span class="m">1024</span> bit RSA keys, keys will be non-exportable...<span class="o">[</span>OK<span class="o">]</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p><strong>步骤2：为R1上的vty线路配置命名列表AAA认证方法</strong></p>
<ul>
<li>配置名为 <strong>SSH-LOGIN</strong> 的命名列表，用于使用本地AAA进行登录认证。</li>
</ul>
<blockquote>
<p>R1(config)# aaa authentication login SSH-LOGIN local</p>
</blockquote>
<p><strong>步骤3：配置vty线路使用定义的AAA认证方法</strong></p>
<ul>
<li>配置vty线路使用已定义的AAA方法，并只允许通过SSH进行远程访问。</li>
</ul>
<blockquote>
<p>R1(config)# line vty 0 4
R1(config-line)# transport input ssh
R1(config-line)# login authentication SSH-LOGIN</p>
</blockquote>
<p><strong>步骤4：验证AAA认证方法</strong></p>
<ul>
<li>从PC-A的命令提示符处通过SSH连接到R1，验证SSH配置及AAA身份验证。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212538090.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212538090.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></li>
</ul>
<h3 id="第三部分在r2上配置基于tacacs服务器的aaa认证">第三部分：在R2上配置基于TACACS+服务器的AAA认证</h3>
<p><strong>步骤1：配置备用本地数据库条目（Admin）</strong></p>
<ul>
<li>为了备份目的，在R2上配置一个本地用户名 <strong>Admin2</strong> ，密码为 <strong>admin2pa55</strong> 。</li>
</ul>
<blockquote>
<p>R2(config)# username Admin2 secret admin2pa55</p>
</blockquote>
<p><strong>步骤2：验证TACACS+服务器配置</strong></p>
<ul>
<li>点击TACACS+ Server，查看“服务”选项卡中的AAA设置，确认存在针对R2的网络配置条目和针对Admin2的用户设置条目。</li>
</ul>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212539539.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212539539.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>步骤3：在R2上配置TACACS+服务器详细信息</strong></p>
<ul>
<li>在R2上配置AAA TACACS+服务器IP地址和共享密钥。</li>
</ul>
<p>注意：尽管 <code>tacacs-server host</code> 和 <code>tacacs-server key</code> 命令已过时，但目前Packet Tracer暂不支持新命令 <code>tacacs server</code> 。此处依然使用旧命令进行配置。</p>
<blockquote>
<p>R2(config)# tacacs-server host 192.168.2.2
R2(config)# tacacs-server key tacacspa55</p>
</blockquote>
<p><strong>步骤4：为R2的控制台访问配置AAA登录认证</strong></p>
<ul>
<li>启用R2上的AAA，并配置所有登录通过AAA TACACS+服务器进行认证，若服务器不可用，则使用本地数据库。</li>
</ul>
<blockquote>
<p>R2(config)# aaa new-model
R2(config)# aaa authentication login default group tacacs+ local</p>
</blockquote>
<p><strong>步骤5：配置控制台线路使用定义的AAA认证方法</strong></p>
<ul>
<li>配置控制台登录使用默认的AAA认证方法。</li>
</ul>
<blockquote>
<p>R2(config)#line console 0
R2(config-line)#login authentication default</p>
</blockquote>
<p>由于之前已经全局配置了AAA和TACACS+，此处不再需要单独配置console线路。</p>
<p><strong>步骤6：验证AAA认证方法</strong></p>
<ul>
<li>通过AAA TACACS+服务器验证用户EXEC登录。可以尝试从另一设备通过console或SSH等方式登录R2并观察其是否成功通过TACACS+服务器进行身份验证。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212542088.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212542088.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></li>
</ul>
<h3 id="第四部分在r3上配置基于radius服务器的aaa认证">第四部分：在R3上配置基于RADIUS服务器的AAA认证</h3>
<p><strong>步骤1：配置备用本地数据库条目（Admin）</strong></p>
<ul>
<li>为了备份目的，在R3上配置一个本地用户名 <strong>Admin3</strong> ，密码为 <strong>admin3pa55</strong> 。</li>
</ul>
<blockquote>
<p>R3(config)# username Admin3 secret admin3pa55</p>
</blockquote>
<p><strong>步骤2：验证RADIUS服务器配置</strong></p>
<ul>
<li>点击RADIUS服务器，并查看“服务”选项卡中的AAA设置。注意其中包含针对R3的网络配置条目和针对Admin3的用户设置条目。</li>
</ul>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212543941.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212543941.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>步骤3：在R3上配置RADIUS服务器详细信息</strong></p>
<ul>
<li>在R3上配置AAA RADIUS服务器IP地址和共享密钥。</li>
</ul>
<p>注意：虽然 <code>radius-server host</code> 和 <code>radius-server key</code> 命令可能已过时，但当前Packet Tracer版本暂不支持新的 <code>radius server</code> 命令。此处仍使用旧命令进行配置。</p>
<blockquote>
<p>R3(config)# radius-server host 192.168.3.2
R3(config)# radius-server key radiuspa55</p>
</blockquote>
<p><strong>步骤4：为R3的控制台访问配置AAA登录认证</strong></p>
<ul>
<li>启用R3上的AAA，并配置所有登录通过AAA RADIUS服务器进行认证，若服务器不可用，则使用本地数据库。</li>
</ul>
<blockquote>
<p>R3(config)# aaa new-model
R3(config)# aaa authentication login default group radius local</p>
</blockquote>
<p><strong>步骤5：配置控制台线路使用定义的AAA认证方法</strong></p>
<ul>
<li>配置控制台登录使用默认的AAA认证方法。</li>
</ul>
<blockquote>
<p>R3(config)#line console 0
R3(config-line)#login authentication default</p>
</blockquote>
<p>由于之前已经全局配置了AAA和RADIUS，此处不再需要单独配置console线路。</p>
<p><strong>步骤6：验证AAA认证方法</strong></p>
<ul>
<li>通过AAA RADIUS服务器验证用户EXEC登录。可以尝试从另一设备通过console或SSH等方式登录R3并观察其是否成功通过RADIUS服务器进行身份验证。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212545768.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212545768.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></li>
</ul>
<p><strong>步骤7：检查结果</strong></p>
<ul>
<li>您的完成度应达到100%。点击“检查结果”以查看反馈和已完成所需组件的验证情况。</li>
</ul>
]]></content:encoded>
    </item>
    <item>
      <title>Packet Tracer - Layer 2 Security（第二层安全配置任务）</title>
      <link>https://yuexuan521.github.io/zh/posts/packet-tracer-layer-2-security%E7%AC%AC%E4%BA%8C%E5%B1%82%E5%AE%89%E5%85%A8%E9%85%8D%E7%BD%AE%E4%BB%BB%E5%8A%A1/</link>
      <pubDate>Thu, 23 Jan 2025 12:48:13 +0000</pubDate>
      <guid>https://yuexuan521.github.io/zh/posts/packet-tracer-layer-2-security%E7%AC%AC%E4%BA%8C%E5%B1%82%E5%AE%89%E5%85%A8%E9%85%8D%E7%BD%AE%E4%BB%BB%E5%8A%A1/</guid>
      <description>&lt;h2 id=&#34;packettracer---第二层安全配置任务&#34;&gt;PacketTracer - 第二层安全配置任务&lt;/h2&gt;
&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212724150.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212724150.png&#34; 
             alt=&#34;在这里插入图片描述&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;h3 id=&#34;目标&#34;&gt;目标&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;确保将中心交换机（3560型号）设置为根桥。&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;保护生成树协议参数以防止对STP的操控攻击。&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;启用端口安全功能以防止CAM表溢出攻击。&lt;/p&gt;</description>
      <content:encoded><![CDATA[<h2 id="packettracer---第二层安全配置任务">PacketTracer - 第二层安全配置任务</h2>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212724150.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212724150.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="目标">目标</h3>
<ul>
<li>
<p>确保将中心交换机（3560型号）设置为根桥。</p>
</li>
<li>
<p>保护生成树协议参数以防止对STP的操控攻击。</p>
</li>
<li>
<p>启用端口安全功能以防止CAM表溢出攻击。</p>
</li>
</ul>
<h3 id="背景场景">背景/场景</h3>
<p>最近网络遭受了一系列攻击。因此，网络管理员已指派您负责配置第二层安全措施。</p>
<p>为了确保网络性能和安全性达到最优状态，管理员希望确定中心3560型号交换机作为根桥。为防止对生成树协议进行篡改攻击，管理员希望确保STP参数得到安全配置。针对CAM表溢出攻击的风险，网络管理员决定配置端口安全策略，限制每个交换机端口学习到的MAC地址数量。一旦学习到的MAC地址超过设定的限制，管理员希望建立机制自动关闭该端口。</p>
<p>所有交换机设备已经预先配置了以下信息：</p>
<ul>
<li>
<p>启用密码： <strong>ciscoenpa55</strong></p>
</li>
<li>
<p>控制台密码： <strong>ciscoconpa55</strong></p>
</li>
<li>
<p>SSH用户名及密码： <strong>SSHadmin / ciscosshpa55</strong></p>
</li>
</ul>
<h3 id="第一部分配置根桥">第一部分：配置根桥</h3>
<p><strong>步骤1：确定当前的根桥。</strong></p>
<p>从中心交换机（Central）发出 <code>show spanning-tree</code> 命令，以确定当前的根桥、查看正在使用的端口及其状态。</p>
<blockquote>
<p>Central#show spanning-tree</p>
</blockquote>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt"> 1
</span><span class="lnt"> 2
</span><span class="lnt"> 3
</span><span class="lnt"> 4
</span><span class="lnt"> 5
</span><span class="lnt"> 6
</span><span class="lnt"> 7
</span><span class="lnt"> 8
</span><span class="lnt"> 9
</span><span class="lnt">10
</span><span class="lnt">11
</span><span class="lnt">12
</span><span class="lnt">13
</span><span class="lnt">14
</span><span class="lnt">15
</span><span class="lnt">16
</span><span class="lnt">17
</span><span class="lnt">18
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-powershell" data-lang="powershell"><span class="line"><span class="cl"><span class="n">VLAN0001</span>
</span></span><span class="line"><span class="cl">  <span class="n">Spanning</span> <span class="n">tree</span> <span class="n">enabled</span> <span class="n">protocol</span> <span class="n">ieee</span>
</span></span><span class="line"><span class="cl">  <span class="n">Root</span> <span class="n">ID</span>    <span class="n">Priority</span>    <span class="mf">32769</span>
</span></span><span class="line"><span class="cl">             <span class="n">Address</span>     <span class="mf">0009</span><span class="p">.</span><span class="py">7C61</span><span class="p">.</span><span class="py">9058</span>
</span></span><span class="line"><span class="cl">             <span class="n">Cost</span>        <span class="mf">4</span>
</span></span><span class="line"><span class="cl">             <span class="n">Port</span>        <span class="mf">25</span><span class="p">(</span><span class="n">GigabitEthernet0</span><span class="p">/</span><span class="mf">1</span><span class="p">)</span>
</span></span><span class="line"><span class="cl">             <span class="n">Hello</span> <span class="n">Time</span>  <span class="mf">2</span> <span class="n">sec</span>  <span class="n">Max</span> <span class="n">Age</span> <span class="mf">20</span> <span class="n">sec</span>  <span class="n">Forward</span> <span class="n">Delay</span> <span class="mf">15</span> <span class="n">sec</span>
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl">  <span class="n">Bridge</span> <span class="n">ID</span>  <span class="n">Priority</span>    <span class="mf">32769</span>  <span class="p">(</span><span class="n">priority</span> <span class="mf">32768</span> <span class="nb">sys-id</span><span class="n">-ext</span> <span class="mf">1</span><span class="p">)</span>
</span></span><span class="line"><span class="cl">             <span class="n">Address</span>     <span class="n">00D0</span><span class="p">.</span><span class="py">D31C</span><span class="p">.</span><span class="py">634C</span>
</span></span><span class="line"><span class="cl">             <span class="n">Hello</span> <span class="n">Time</span>  <span class="mf">2</span> <span class="n">sec</span>  <span class="n">Max</span> <span class="n">Age</span> <span class="mf">20</span> <span class="n">sec</span>  <span class="n">Forward</span> <span class="n">Delay</span> <span class="mf">15</span> <span class="n">sec</span>
</span></span><span class="line"><span class="cl">             <span class="n">Aging</span> <span class="n">Time</span>  <span class="mf">20</span>
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl"><span class="n">Interface</span>        <span class="n">Role</span> <span class="n">Sts</span> <span class="n">Cost</span>      <span class="n">Prio</span><span class="p">.</span><span class="py">Nbr</span> <span class="nb">Type
</span></span></span><span class="line"><span class="cl"><span class="p">----------------</span> <span class="p">----</span> <span class="p">---</span> <span class="p">---------</span> <span class="p">--------</span> <span class="p">--------------------------------</span>
</span></span><span class="line"><span class="cl"><span class="n">Gi0</span><span class="p">/</span><span class="mf">2</span>            <span class="n">Desg</span> <span class="n">FWD</span> <span class="mf">4</span>         <span class="mf">128.26</span>   <span class="n">P2p</span>
</span></span><span class="line"><span class="cl"><span class="n">Gi0</span><span class="p">/</span><span class="mf">1</span>            <span class="n">Root</span> <span class="n">FWD</span> <span class="mf">4</span>         <span class="mf">128.25</span>   <span class="n">P2p</span>
</span></span><span class="line"><span class="cl"><span class="n">Fa0</span><span class="p">/</span><span class="mf">1</span>            <span class="n">Desg</span> <span class="n">FWD</span> <span class="mf">19</span>        <span class="mf">128.1</span>    <span class="n">P2p</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p>哪个交换机是当前的根桥？</p>
<p>基于当前的根桥，请绘制由此得出的生成树拓扑结构。</p>
<p><strong>步骤2：将Central设置为主根桥。</strong></p>
<p>使用命令 <code>spanning-tree vlan 1 root primary</code> ，将 <strong>Central</strong> 设置为根桥。</p>
<blockquote>
<p>Central(config)#spanning-tree vlan 1 root primary</p>
</blockquote>
<p><strong>步骤3：将SW-1设置为备用根桥。</strong></p>
<p>使用命令 <code>spanning-tree vlan 1 root secondary</code> ，将 <strong>SW-1</strong> 设置为备用根桥。</p>
<blockquote>
<p>SW-1(config)#spanning-tree vlan 1 root secondary</p>
</blockquote>
<p><strong>步骤4：验证生成树配置。</strong></p>
<p>发出 <code>show spanning-tree</code> 命令来验证Central已成为根桥。</p>
<p>在Central#提示符下执行了该命令后显示如下信息：</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span><span class="lnt">4
</span><span class="lnt">5
</span><span class="lnt">6
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-powershell" data-lang="powershell"><span class="line"><span class="cl"><span class="n">VLAN0001</span>
</span></span><span class="line"><span class="cl">   <span class="n">Spanning</span> <span class="n">tree</span> <span class="n">enabled</span> <span class="n">protocol</span> <span class="n">ieee</span>
</span></span><span class="line"><span class="cl">   <span class="n">Root</span> <span class="n">ID</span>  <span class="n">Priority</span>      <span class="mf">24577</span>
</span></span><span class="line"><span class="cl">            <span class="n">Address</span>       <span class="n">00D0</span><span class="p">.</span><span class="py">D31C</span><span class="p">.</span><span class="py">634C</span>
</span></span><span class="line"><span class="cl">          <span class="p">--&gt;&gt;</span>  <span class="n">This</span> <span class="n">bridge</span> <span class="n">is</span> <span class="n">the</span> <span class="n">root</span>  <span class="p">&lt;&lt;--</span>
</span></span><span class="line"><span class="cl">            <span class="n">Hello</span> <span class="n">Time</span>  <span class="mf">2</span> <span class="n">sec</span>  <span class="n">Max</span> <span class="n">Age</span>  <span class="mf">20</span> <span class="n">sec</span>   <span class="n">Forward</span> <span class="n">Delay</span>  <span class="mf">15</span> <span class="n">sec</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p>根据上述信息，哪个交换机是当前的根桥？</p>
<p>基于新的根桥设置，请绘制由此得出的生成树拓扑结构。</p>
<h3 id="第二部分防止stp攻击">第二部分：防止STP攻击</h3>
<p><strong>步骤1：在所有接入端口上启用PortFast。</strong></p>
<p>PortFast应在连接至单个工作站或服务器的接入端口上配置，以使它们更快地进入活动状态。在SW-A和SW-B的相连接入端口上使用 <code>spanning-tree portfast</code> 命令来启用 <strong>PortFast</strong> 。</p>
<blockquote>
<p>SW-A(config)#int range f0/1-4
SW-A(config-if-range)#spanning-tree portfast</p>
</blockquote>
<blockquote>
<p>SW-B(config)#int range f0/1-4
SW-B(config-if-range)#spanning-tree portfast</p>
</blockquote>
<p><strong>步骤2：在所有接入端口上启用BPDU防护。</strong></p>
<p>BPDU guard是一项功能，可以有助于防止恶意交换机和在接入端口上的欺骗行为。在SW-A和SW-B的接入端口上启用BPDU防护。</p>
<p>注解：为了防止STP报文（BPDU）操纵攻击，在接口配置模式下可以对每个单独端口使用命令 <code>spanning-tree bpduguard enable</code> 来启用BPDU防护；或者在全局配置模式下使用命令 <code>spanning-tree portfast bpduguard default</code> 来默认为所有启用PortFast的端口启用BPDU防护。针对本活动评分目的，请使用 <code>spanning-tree bpduguard enable</code> 命令。</p>
<blockquote>
<p>SW-A(config)#int range f0/1-4
SW-A(config-if-range)#spanning-tree bpduguard enable</p>
</blockquote>
<blockquote>
<p>SW-B(config)#int range f0/1-4
SW-B(config-if-range)#spanning-tree bpduguard enable</p>
</blockquote>
<p><strong>步骤3：启用根保护。</strong></p>
<p>根保护可以在非根端口的所有交换机端口上启用，最好部署在连接到其他非根交换机的端口上。使用 <code>show spanning-tree</code> 命令确定每个交换机上根端口的位置。</p>
<p>在SW-1上，在端口F0/23和F0/24上启用根保护。同样，在SW-2上，在端口F0/23和F0/24上也启用根保护。</p>
<blockquote>
<p>SW-1(config)#int range f0/23-24
SW-1(config-if-range)#spanning-tree guard root</p>
</blockquote>
<blockquote>
<p>SW-2(config)#int range f0/23-24
SW-2(config-if-range)#spanning-tree guard root</p>
</blockquote>
<h3 id="第三部分配置端口安全并禁用未使用端口">第三部分：配置端口安全并禁用未使用端口</h3>
<p><strong>步骤1：在连接到主机设备的所有端口上配置基本端口安全。</strong></p>
<p>此操作应在SW-A和SW-B的所有接入端口上执行。设置允许学习的MAC地址最大数量为 <strong>2</strong> ，允许动态学习MAC地址，并将违规处理方式设为 <strong>shutdown</strong> （关闭）。</p>
<p>注解：只有当交换机端口配置为接入模式时，才能启用端口安全功能。</p>
<blockquote>
<p>SW-A(config)#interface range f0/1 - 22
SW-A(config-if-range)#switchport mode access
SW-A(config-if-range)#switchport port-security
SW-A(config-if-range)#switchport port-security maximum 2
SW-A(config-if-range)#switchport port-security violation shutdown
SW-A(config-if-range)#switchport port-security mac-address sticky</p>
</blockquote>
<blockquote>
<p>SW-B(config)#interface range f0/1-22
SW-B(config-if-range)#switchport mode access
SW-B(config-if-range)#switchport port-security max
SW-B(config-if-range)#switchport port-security maximum 2
SW-B(config-if-range)#switchport port-security violation shutdown
SW-B(config-if-range)#switchport port-security mac-address sticky</p>
</blockquote>
<p>为什么与其它交换机设备相连的端口不启用端口安全？</p>
<p><strong>步骤2：验证端口安全配置。</strong></p>
<p>a. 在SW-A上，输入命令 <code>show port-security interface f0/1</code> 来确认已成功配置了端口安全。</p>
<blockquote>
<p>SW-A#show port-security int f0/1
<mark>Port Security : Enabled</mark>
Port Status : Secure-up
<mark>Violation Mode : Shutdown</mark>
Aging Time : 0 mins
Aging Type : Absolute
SecureStatic Address Aging : Disabled
<mark>Maximum MAC Addresses : 2</mark>
Total MAC Addresses : 0
Configured MAC Addresses : 0
<mark>Sticky MAC Addresses : 0</mark>
<mark>Last Source Address:Vlan : 0000.0000.0000:0</mark>
Security Violation Count : 0</p>
</blockquote>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt"> 1
</span><span class="lnt"> 2
</span><span class="lnt"> 3
</span><span class="lnt"> 4
</span><span class="lnt"> 5
</span><span class="lnt"> 6
</span><span class="lnt"> 7
</span><span class="lnt"> 8
</span><span class="lnt"> 9
</span><span class="lnt">10
</span><span class="lnt">11
</span><span class="lnt">12
</span><span class="lnt">13
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-powershell" data-lang="powershell"><span class="line"><span class="cl"><span class="nb">SW-A</span><span class="c"># show port-security interface f0/1</span>
</span></span><span class="line"><span class="cl"><span class="n">端口安全</span>              <span class="err">:</span> <span class="n">已启用</span>
</span></span><span class="line"><span class="cl"><span class="n">端口状态</span>                <span class="err">:</span> <span class="n">安全且已启动</span>
</span></span><span class="line"><span class="cl"><span class="n">违规模式</span>             <span class="err">:</span> <span class="n">关闭端口</span>
</span></span><span class="line"><span class="cl"><span class="n">老化时间</span>                 <span class="err">:</span> <span class="n">0分钟</span>
</span></span><span class="line"><span class="cl"><span class="n">老化类型</span>                 <span class="err">:</span> <span class="n">绝对时间</span>
</span></span><span class="line"><span class="cl"><span class="n">静态安全MAC地址老化</span><span class="err">:</span> <span class="n">禁用</span>
</span></span><span class="line"><span class="cl"><span class="n">最大MAC地址数</span>      <span class="err">:</span> <span class="mf">2</span>
</span></span><span class="line"><span class="cl"><span class="n">总MAC地址数</span>        <span class="err">:</span> <span class="mf">0</span>
</span></span><span class="line"><span class="cl"><span class="n">已配置MAC地址数</span>   <span class="err">:</span> <span class="mf">0</span>
</span></span><span class="line"><span class="cl"><span class="n">粘性MAC地址数</span>       <span class="err">:</span> <span class="mf">0</span>
</span></span><span class="line"><span class="cl"><span class="n">最近源地址</span><span class="err">:</span><span class="n">VLAN</span>   <span class="err">:</span> <span class="mf">0000.0000</span><span class="p">.</span><span class="mf">0000</span><span class="err">:</span><span class="mf">0</span>
</span></span><span class="line"><span class="cl"><span class="n">安全违规计数</span>         <span class="err">:</span> <span class="mf">0</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p>b. 从C1向C2发送Ping请求，然后再次输入 <code>show port-security interface f0/1</code> 命令，以验证交换机是否已学会C1的MAC地址。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212726209.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212726209.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212728180.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212728180.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>步骤3：禁用未使用的端口。</strong></p>
<p>禁用当前所有未使用的端口。</p>
<blockquote>
<p>SW-A(config)#int range f0/5-22
SW-A(config-if-range)#shutdown</p>
</blockquote>
<blockquote>
<p>SW-B(config)#int range f0/5-22
SW-B(config-if-range)#shutdown</p>
</blockquote>
<p><strong>步骤4：检查结果。</strong></p>
<p>您的完成度应为100%。点击“检查结果”查看反馈信息以及所需组件完成情况的验证。</p>
<h3 id="实验脚本">实验脚本：</h3>
<p><strong>Central:</strong></p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-powershell" data-lang="powershell"><span class="line"><span class="cl"><span class="p">!</span> <span class="n">使Central成为Vlan1的根桥</span>
</span></span><span class="line"><span class="cl"><span class="nb">spanning-tree</span> <span class="n">vlan</span> <span class="mf">1</span> <span class="n">root</span> <span class="n">primary</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p><strong>SW-1:</strong></p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span><span class="lnt">4
</span><span class="lnt">5
</span><span class="lnt">6
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-powershell" data-lang="powershell"><span class="line"><span class="cl"><span class="p">!</span> <span class="n">使SW</span><span class="p">-</span><span class="n">1成为Vlan1的次根桥</span>
</span></span><span class="line"><span class="cl"><span class="nb">spanning-tree</span> <span class="n">vlan</span> <span class="mf">1</span> <span class="n">root</span> <span class="n">secondary</span>
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">进入f0</span><span class="p">/</span><span class="mf">23</span><span class="n">-f0</span><span class="p">/</span><span class="n">24端口</span>
</span></span><span class="line"><span class="cl"><span class="n">interface</span> <span class="n">range</span> <span class="n">fastEthernet</span> <span class="mf">0</span><span class="p">/</span><span class="mf">23</span> <span class="p">-</span> <span class="n">fastEthernet</span> <span class="mf">0</span><span class="p">/</span><span class="mf">24</span>
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">启用STP根防护功能</span><span class="err">，</span><span class="n">在此端口不接受拥有更优BID的BPDU报文</span>
</span></span><span class="line"><span class="cl"><span class="nb">spanning-tree</span> <span class="n">guard</span> <span class="n">root</span> 
</span></span></code></pre></td></tr></table>
</div>
</div><p><strong>SW-2:</strong></p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span><span class="lnt">4
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-powershell" data-lang="powershell"><span class="line"><span class="cl"><span class="p">!</span> <span class="n">进入f0</span><span class="p">/</span><span class="mf">23</span><span class="n">-f0</span><span class="p">/</span><span class="n">24端口</span>
</span></span><span class="line"><span class="cl"><span class="n">interface</span> <span class="n">range</span> <span class="n">fastEthernet</span> <span class="mf">0</span><span class="p">/</span><span class="mf">23</span> <span class="p">-</span> <span class="n">fastEthernet</span> <span class="mf">0</span><span class="p">/</span><span class="mf">24</span>
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">启用STP根防护功能</span><span class="err">，</span><span class="n">在此端口不接受拥有更优BID的BPDU报文</span>
</span></span><span class="line"><span class="cl"><span class="nb">spanning-tree</span> <span class="n">guard</span> <span class="n">root</span> 
</span></span></code></pre></td></tr></table>
</div>
</div><p><strong>SW-A:</strong></p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt"> 1
</span><span class="lnt"> 2
</span><span class="lnt"> 3
</span><span class="lnt"> 4
</span><span class="lnt"> 5
</span><span class="lnt"> 6
</span><span class="lnt"> 7
</span><span class="lnt"> 8
</span><span class="lnt"> 9
</span><span class="lnt">10
</span><span class="lnt">11
</span><span class="lnt">12
</span><span class="lnt">13
</span><span class="lnt">14
</span><span class="lnt">15
</span><span class="lnt">16
</span><span class="lnt">17
</span><span class="lnt">18
</span><span class="lnt">19
</span><span class="lnt">20
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-powershell" data-lang="powershell"><span class="line"><span class="cl"><span class="p">!</span> <span class="n">选择接入的端口</span><span class="err">，</span><span class="n">F0</span><span class="p">/</span><span class="mf">1</span><span class="n">-F0</span><span class="p">/</span><span class="mf">4</span>
</span></span><span class="line"><span class="cl"><span class="n">interface</span> <span class="n">range</span> <span class="n">fastEthernet</span> <span class="mf">0</span><span class="p">/</span><span class="mf">1</span> <span class="p">-</span> <span class="n">fastEthernet</span> <span class="mf">0</span><span class="p">/</span><span class="mf">4</span>
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">让F0</span><span class="p">/</span><span class="mf">1</span><span class="n">-F0</span><span class="p">/</span><span class="n">4端口开启portfast</span><span class="err">（</span><span class="n">不参与生成树</span><span class="err">）</span>
</span></span><span class="line"><span class="cl"><span class="nb">spanning-tree</span> <span class="n">portfast</span> 
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">为他们启用BPDU防护功能</span><span class="err">，</span><span class="n">在此端口不接受BPDU</span><span class="err">；</span><span class="n">收到BPDU</span><span class="err">，</span><span class="n">端口禁用</span>
</span></span><span class="line"><span class="cl"><span class="nb">spanning-tree</span> <span class="n">bpduguard</span> <span class="n">enable</span> 
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">开启access模式</span>
</span></span><span class="line"><span class="cl"><span class="n">switchport</span> <span class="n">mode</span> <span class="n">access</span>
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">开启端口安全</span>
</span></span><span class="line"><span class="cl"><span class="n">switchport</span> <span class="nb">port-security</span> 
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">设置最大Mac学习数为2</span>
</span></span><span class="line"><span class="cl"><span class="n">switchport</span> <span class="nb">port-security</span> <span class="n">maximum</span> <span class="mf">2</span>
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">设置学习到的Mac地址将被保存</span>
</span></span><span class="line"><span class="cl"><span class="n">switchport</span> <span class="nb">port-security</span> <span class="nb">mac-address</span> <span class="n">sticky</span> 
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">设置超过措施</span><span class="err">：</span><span class="n">关闭端口</span>
</span></span><span class="line"><span class="cl"><span class="n">switchport</span> <span class="nb">port-security</span> <span class="n">violation</span> <span class="n">shutdown</span> 
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">进入不使用的端口</span>
</span></span><span class="line"><span class="cl"><span class="n">interface</span> <span class="n">range</span> <span class="n">fastEthernet</span> <span class="mf">0</span><span class="p">/</span><span class="mf">5</span> <span class="p">-</span> <span class="n">fastEthernet</span> <span class="mf">0</span><span class="p">/</span><span class="mf">22</span>
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">关闭</span>
</span></span><span class="line"><span class="cl"><span class="n">shutdown</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p><strong>SW-B:</strong></p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt"> 1
</span><span class="lnt"> 2
</span><span class="lnt"> 3
</span><span class="lnt"> 4
</span><span class="lnt"> 5
</span><span class="lnt"> 6
</span><span class="lnt"> 7
</span><span class="lnt"> 8
</span><span class="lnt"> 9
</span><span class="lnt">10
</span><span class="lnt">11
</span><span class="lnt">12
</span><span class="lnt">13
</span><span class="lnt">14
</span><span class="lnt">15
</span><span class="lnt">16
</span><span class="lnt">17
</span><span class="lnt">18
</span><span class="lnt">19
</span><span class="lnt">20
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-powershell" data-lang="powershell"><span class="line"><span class="cl"><span class="p">!</span> <span class="n">选择接入的端口</span><span class="err">，</span><span class="n">F0</span><span class="p">/</span><span class="mf">1</span><span class="n">-F0</span><span class="p">/</span><span class="mf">4</span>
</span></span><span class="line"><span class="cl"><span class="n">interface</span> <span class="n">range</span> <span class="n">fastEthernet</span> <span class="mf">0</span><span class="p">/</span><span class="mf">1</span> <span class="p">-</span> <span class="n">fastEthernet</span> <span class="mf">0</span><span class="p">/</span><span class="mf">4</span>
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">让F0</span><span class="p">/</span><span class="mf">1</span><span class="n">-F0</span><span class="p">/</span><span class="n">4端口开启portfast</span><span class="err">（</span><span class="n">不参与生成树</span><span class="err">）</span>
</span></span><span class="line"><span class="cl"><span class="nb">spanning-tree</span> <span class="n">portfast</span> 
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">为他们开启BPDU</span>
</span></span><span class="line"><span class="cl"><span class="nb">spanning-tree</span> <span class="n">bpduguard</span> <span class="n">enable</span> 
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">开启access模式</span>
</span></span><span class="line"><span class="cl"><span class="n">switchport</span> <span class="n">mode</span> <span class="n">access</span>
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">开启端口安全</span>
</span></span><span class="line"><span class="cl"><span class="n">switchport</span> <span class="nb">port-security</span> 
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">设置最大Mac学习数为2</span>
</span></span><span class="line"><span class="cl"><span class="n">switchport</span> <span class="nb">port-security</span> <span class="n">maximum</span> <span class="mf">2</span>
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">设置学习到的Mac地址将被保存</span>
</span></span><span class="line"><span class="cl"><span class="n">switchport</span> <span class="nb">port-security</span> <span class="nb">mac-address</span> <span class="n">sticky</span> 
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">设置超过措施</span><span class="err">：</span><span class="n">关闭端口</span>
</span></span><span class="line"><span class="cl"><span class="n">switchport</span> <span class="nb">port-security</span> <span class="n">violation</span> <span class="n">shutdown</span> 
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">进入不使用的端口</span>
</span></span><span class="line"><span class="cl"><span class="n">interface</span> <span class="n">range</span> <span class="n">fastEthernet</span> <span class="mf">0</span><span class="p">/</span><span class="mf">5</span> <span class="p">-</span> <span class="n">fastEthernet</span> <span class="mf">0</span><span class="p">/</span><span class="mf">22</span>
</span></span><span class="line"><span class="cl"><span class="p">!</span> <span class="n">关闭</span>
</span></span><span class="line"><span class="cl"><span class="n">shutdown</span>
</span></span></code></pre></td></tr></table>
</div>
</div>]]></content:encoded>
    </item>
    <item>
      <title>Packet Tracer - Configuring Extended ACLs - Scenario 1（配置扩展访问控制列表 - 场景1）</title>
      <link>https://yuexuan521.github.io/zh/posts/packet-tracer-configuring-extended-acls-scenario-1%E9%85%8D%E7%BD%AE%E6%89%A9%E5%B1%95%E8%AE%BF%E9%97%AE%E6%8E%A7%E5%88%B6%E5%88%97%E8%A1%A8-%E5%9C%BA%E6%99%AF1/</link>
      <pubDate>Thu, 23 Jan 2025 12:47:58 +0000</pubDate>
      <guid>https://yuexuan521.github.io/zh/posts/packet-tracer-configuring-extended-acls-scenario-1%E9%85%8D%E7%BD%AE%E6%89%A9%E5%B1%95%E8%AE%BF%E9%97%AE%E6%8E%A7%E5%88%B6%E5%88%97%E8%A1%A8-%E5%9C%BA%E6%99%AF1/</guid>
      <description>&lt;h2 id=&#34;packet-tracer---配置扩展访问控制列表---场景1&#34;&gt;Packet Tracer - 配置扩展访问控制列表 - 场景1&lt;/h2&gt;
&lt;h3 id=&#34;地址表&#34;&gt;地址表&lt;/h3&gt;
&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212710707.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212710707.png&#34; 
             alt=&#34;在这里插入图片描述&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;h3 id=&#34;目标&#34;&gt;目标&lt;/h3&gt;
&lt;p&gt;第一部分：配置、应用并验证一个编号扩展访问控制列表（Extended ACL）&lt;/p&gt;
&lt;p&gt;第二部分：配置、应用并验证一个命名扩展访问控制列表（Extended Named ACL）&lt;/p&gt;</description>
      <content:encoded><![CDATA[<h2 id="packet-tracer---配置扩展访问控制列表---场景1">Packet Tracer - 配置扩展访问控制列表 - 场景1</h2>
<h3 id="地址表">地址表</h3>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212710707.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212710707.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="目标">目标</h3>
<p>第一部分：配置、应用并验证一个编号扩展访问控制列表（Extended ACL）</p>
<p>第二部分：配置、应用并验证一个命名扩展访问控制列表（Extended Named ACL）</p>
<h3 id="背景场景">背景/场景</h3>
<p>两位员工需要访问由服务器提供的服务。PC1只需要FTP访问权限，而PC2仅需Web访问权限。两台计算机都能ping通服务器，但彼此之间不能互相ping通。</p>
<hr>
<h3 id="第一部分配置应用并验证一个编号扩展访问控制列表">第一部分：配置、应用并验证一个编号扩展访问控制列表</h3>
<p><strong>步骤 1：配置ACL以允许FTP和ICMP流量</strong></p>
<p>a. 在R1的全局配置模式下，输入以下命令确定扩展访问列表的第一个有效编号。</p>
<blockquote>
<p>R1(config)# access-list ?
&lt;1-99&gt; IP标准访问列表
&lt;100-199&gt; IP扩展访问列表</p>
</blockquote>
<p>b. 向命令中添加数字100后跟问号。</p>
<blockquote>
<p>R1(config)# access-list 100 ?
deny 拒绝指定的数据包
permit 允许转发指定的数据包
remark 访问列表条目注释</p>
</blockquote>
<p>c. 为了允许FTP流量，在“permit”后面输入问号。</p>
<blockquote>
<p>R1(config)# access-list 100 permit ?
ahp 认证报头协议
eigrp 思科 EIGRP 路由协议
esp 封装安全负载
gre 思科 GRE 隧道
icmp Internet 控制消息协议
ip 任意 Internet 协议
ospf OSPF 路由协议
tcp 传输控制协议
udp 用户数据报协议</p>
</blockquote>
<p>d. 此ACL允许FTP和ICMP流量。虽然ICMP已列出，但FTP未列出，因为FTP使用TCP协议。因此，输入“tcp”进一步细化ACL帮助信息。</p>
<blockquote>
<p>R1(config)# access-list 100 permit tcp ?
A.B.C.D 源地址
any 任意源主机
host 单个源主机</p>
</blockquote>
<p>e. 注意可以通过使用“host”关键字仅过滤PC1的流量，或者允许任何主机。在本例中，允许任何属于172.22.34.64/27网络地址范围内的设备。输入网络地址后跟问号。</p>
<blockquote>
<p>R1(config)# access-list 100 permit tcp 172.22.34.64 ?
A.B.C.D 源通配符位</p>
</blockquote>
<p>f. 计算通配符掩码，通过计算子网掩码的二进制相反数。</p>
<p>255.255.255.224 = 11111111.11111111.11111111.11100000
0.0.0.31 = 00000000.00000000.00000000.00011111</p>
<p>g. 输入通配符掩码后跟问号。</p>
<blockquote>
<p>R1(config)# access-list 100 permit tcp 172.22.34.64 0.0.0.31 ?
A.B.C.D 目的地址
any 任意目的主机
eq 仅匹配给定端口号上的数据包
gt 仅匹配具有较大端口号的数据包
host 单个目的主机
lt 仅匹配具有较小端口号的数据包
neq 仅匹配非给定端口号上的数据包
range 仅匹配端口号范围内的数据包</p>
</blockquote>
<p>h. 配置目标地址。在此场景中，我们正在为单个目标（即服务器）过滤流量。输入“host”关键字后跟服务器的IP地址。</p>
<blockquote>
<p>R1(config)# access-list 100 permit tcp 172.22.34.64 0.0.0.31 host 172.22.34.62 ?
dscp 匹配具有给定 dscp 值的数据包
eq 仅匹配给定端口号上的数据包
established 已建立
gt 仅匹配有更大端口号的数据包
lt 仅匹配有更小端口号的数据包
neq 仅匹配不具有给定端口号的数据包
precedence 匹配具有给定优先级值的数据包
range 仅匹配端口号范围内的数据包</p>
</blockquote>
<p>i. 注意其中一个选项是（回车）。换句话说，您可以按Enter键，该语句将允许所有TCP流量。然而，我们只允许FTP流量；因此，输入“eq”关键字后跟问号以显示可用选项。然后输入“ftp”并按Enter。</p>
<blockquote>
<p>R1(config)# access-list 100 permit tcp 172.22.34.64 0.0.0.31 host 172.22.34.62 eq ftp</p>
</blockquote>
<p>j. 创建第二个访问列表语句以允许从PC1到Server的ICMP（ping等）流量。注意，访问列表编号保持不变，并且不需要指定特定类型的ICMP流量。</p>
<blockquote>
<p>R1(config)# access-list 100 permit icmp 172.22.34.64 0.0.0.31 host 172.22.34.62
&lt;0-65535&gt; 端口号
ftp 文件传输协议 (21)
pop3 邮局协议 v3 (110)
smtp 简单邮件传输协议 (25)
telnet Telnet (23)
www 万维网（HTTP，80）</p>
</blockquote>
<p>k. 默认情况下，所有其他流量都将被拒绝。</p>
<p><strong>步骤 2：在正确接口上应用ACL以过滤流量</strong></p>
<p>从R1的角度看，ACL 100应用于与Gigabit Ethernet 0/0接口相连的网络中的入站流量。进入接口配置模式并应用ACL。</p>
<blockquote>
<p>R1(config)# interface gigabitEthernet 0/0
R1(config-if)# ip access-group 100 in</p>
</blockquote>
<p><strong>步骤 3：验证ACL实现</strong></p>
<p>a. 从PC1 ping Server。如果无法成功ping通，请先验证IP地址是否正确。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212712649.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212712649.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>b. 从PC1 FTP至Server。用户名和密码均为cisco。</p>
<blockquote>
<p>PC&gt; ftp 172.22.34.62</p>
</blockquote>
<p>c. 退出Server上的FTP服务。</p>
<blockquote>
<p>ftp&gt; quit</p>
</blockquote>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212715058.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212715058.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>d. 从PC1 ping PC2。由于未明确允许此流量，目标主机应无法到达。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212716887.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212716887.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="第二部分配置应用并验证一个命名扩展访问控制列表">第二部分：配置、应用并验证一个命名扩展访问控制列表</h3>
<p><strong>步骤 1：配置ACL以允许HTTP访问和ICMP</strong></p>
<p>a. 命名ACL以“ip”关键字开始。在R1的全局配置模式下，输入以下命令后跟问号。</p>
<blockquote>
<p>R1(config)# ip access-list ?
extended 扩展访问列表
standard 标准访问列表</p>
</blockquote>
<p>b. 您可以配置命名的标准和扩展ACL。由于此访问列表需要过滤源和目标IP地址，因此必须是扩展类型。将名称设为 <strong>HTTP_ONLY</strong> （请注意，在Packet Tracer中评分时，名称区分大小写）。</p>
<blockquote>
<p>R1(config)# ip access-list extended HTTP_ONLY</p>
</blockquote>
<p>c. 提示符会改变。现在您处于扩展命名ACL配置模式。PC2 LAN上的所有设备都需要TCP访问权限。输入网络地址后跟问号。</p>
<blockquote>
<p>R1(config-ext-nacl)# permit tcp 172.22.34.96 ?
A.B.C.D 源通配符位</p>
</blockquote>
<p>d. 另一种计算通配符的方法是从255.255.255.255减去子网掩码：</p>
<table>
  <thead>
      <tr>
          <th style="text-align: center">255.255.255.255 – 255.255.255.240</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td style="text-align: center">= 0. 0. 0. 15</td>
      </tr>
  </tbody>
</table>
<blockquote>
<p>R1(config-ext-nacl)# permit tcp 172.22.34.96 0.0.0.15 ?</p>
</blockquote>
<p>e. 完成语句，指定服务器地址，并筛选www流量，如同第一部分操作一样。</p>
<blockquote>
<p>R1(config-ext-nacl)# permit tcp 172.22.34.96 0.0.0.15 host 172.22.34.62 eq www</p>
</blockquote>
<p>f. 创建第二个访问列表语句，允许从PC2到Server的ICMP（ping等）流量。注意：提示符保持不变，此处无需指定特定类型的ICMP流量。</p>
<blockquote>
<p>R1(config-ext-nacl)# permit icmp 172.22.34.96 0.0.0.15 host 172.22.34.62</p>
</blockquote>
<p>g. 默认情况下，所有其他流量都将被拒绝。退出扩展命名ACL配置模式。</p>
<p><strong>步骤 2：在正确接口上应用ACL以过滤流量</strong></p>
<p>从R1的角度看，访问列表HTTP_ONLY应用于与Gigabit Ethernet 0/1接口相连的网络中的入站流量。进入接口配置模式并应用ACL。</p>
<blockquote>
<p>R1(config)# interface gigabitEthernet 0/1
R1(config-if)# ip access-group HTTP_ONLY in</p>
</blockquote>
<p><strong>步骤 3：验证ACL实现</strong></p>
<p>a. 从PC2 ping Server。如果ping成功，则继续进行下一步；如果不成功，请先验证IP地址是否正确。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212718693.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212718693.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>b. 从PC2通过FTP连接到Server。连接应该失败。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212720616.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212720616.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>c. 在PC2上打开网页浏览器，将Server的IP地址作为URL输入。连接应该成功建立。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212722197.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212722197.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
]]></content:encoded>
    </item>
    <item>
      <title>Packet Tracer - Layer 2 VLAN Security（第二层VLAN安全配置任务）</title>
      <link>https://yuexuan521.github.io/zh/posts/packet-tracer-layer-2-vlan-security%E7%AC%AC%E4%BA%8C%E5%B1%82vlan%E5%AE%89%E5%85%A8%E9%85%8D%E7%BD%AE%E4%BB%BB%E5%8A%A1/</link>
      <pubDate>Thu, 23 Jan 2025 12:47:44 +0000</pubDate>
      <guid>https://yuexuan521.github.io/zh/posts/packet-tracer-layer-2-vlan-security%E7%AC%AC%E4%BA%8C%E5%B1%82vlan%E5%AE%89%E5%85%A8%E9%85%8D%E7%BD%AE%E4%BB%BB%E5%8A%A1/</guid>
      <description>&lt;h2 id=&#34;packettracer---第二层vlan安全配置任务&#34;&gt;PacketTracer - 第二层VLAN安全配置任务&lt;/h2&gt;
&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212730148.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212730148.png&#34; 
             alt=&#34;在这里插入图片描述&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;h3 id=&#34;目标&#34;&gt;目标&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;在SW-1和SW-2之间建立新的冗余链路。&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;在新连接的SW-1和SW-2之间的干线链路上启用中继并配置安全措施。&lt;/p&gt;</description>
      <content:encoded><![CDATA[<h2 id="packettracer---第二层vlan安全配置任务">PacketTracer - 第二层VLAN安全配置任务</h2>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212730148.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212730148.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="目标">目标</h3>
<ul>
<li>
<p>在SW-1和SW-2之间建立新的冗余链路。</p>
</li>
<li>
<p>在新连接的SW-1和SW-2之间的干线链路上启用中继并配置安全措施。</p>
</li>
<li>
<p>创建一个新的管理VLAN（VLAN 20）并将一台管理PC连接到该VLAN。</p>
</li>
<li>
<p>实施ACL以防止外部用户访问管理VLAN。</p>
</li>
</ul>
<h3 id="背景场景">背景/场景</h3>
<p>一家公司的网络当前使用两个独立的VLAN：VLAN 5和VLAN 10。此外，所有干线端口都已配置为本征VLAN 15。网络管理员希望在交换机SW-1和SW-2之间添加一条冗余链路。这条链路必须启用中继功能，并确保所有必要的安全设置到位。</p>
<p>此外，网络管理员还希望将一台管理PC连接到交换机SW-A。管理员希望这台管理PC能够连接到所有交换机及路由器，但不希望任何其他设备能够连接到管理PC或这些交换机上。因此，管理员计划创建一个新的VLAN 20用于管理目的。</p>
<p>所有设备已经预先配置了以下信息：</p>
<ul>
<li>
<p>启用密码： <strong>ciscoenpa55</strong></p>
</li>
<li>
<p>控制台密码： <strong>ciscoconpa55</strong></p>
</li>
<li>
<p>SSH用户名及密码： <strong>SSHadmin / ciscosshpa55</strong></p>
</li>
</ul>
<h3 id="第一部分验证连通性">第一部分：验证连通性</h3>
<p><strong>步骤1：验证C2（VLAN 10）与C3（VLAN 10）之间的连通性。</strong></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212732555.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212732555.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212734673.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212734673.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>步骤2：验证C2（VLAN 10）与D1（VLAN 5）之间的连通性。</strong>
注：如果使用简易PDU GUI包，请确保ping两次以允许ARP过程完成。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212736073.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212736073.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212738694.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212738694.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="第二部分在sw-1和sw-2之间创建冗余链路">第二部分：在SW-1和SW-2之间创建冗余链路</h3>
<p><strong>步骤1：连接SW-1和SW-2。</strong></p>
<p>使用交叉线缆将SW-1的F0/23端口与SW-2的F0/23端口相连。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212740831.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212740831.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>步骤2：在SW-1和SW-2之间的链路上启用干线功能，包括所有干线安全机制。</strong></p>
<p>已预先配置了所有现存干线接口的干线功能。新链接必须设置为干线，并包括所有干线安全机制。在SW-1和SW-2上，将端口设置为干线模式，将本征VLAN 15分配给干线端口，并禁用自动协商功能。</p>
<blockquote>
<p>SW-1(config)#interface f0/23
SW-1(config-if)#switchport mode trunk
SW-1(config-if)#switchport trunk native vlan 15
SW-1(config-if)#switchport nonegotiate
SW-1(config-if)#no shutdown</p>
</blockquote>
<blockquote>
<p>SW-2(config)#interface f0/23
SW-2(config-if)#switchport mode trunk
SW-2(config-if)#switchport trunk native vlan 15
SW-2(config-if)#switchport nonegotiate
SW-2(config-if)#no shutdown</p>
</blockquote>
<h3 id="第三部分启用vlan-20作为管理vlan">第三部分：启用VLAN 20作为管理VLAN</h3>
<p>网络管理员希望通过管理PC访问所有交换机和路由设备。出于安全原因，管理员希望确保所有受管设备都在一个独立的VLAN中。</p>
<p><strong>步骤1：在SW-A上启用管理VLAN（VLAN 20）。</strong></p>
<p>a. 在SW-A上启用VLAN 20。</p>
<blockquote>
<p>SW-A(config)#vlan 20
SW-A(config-vlan)#exit</p>
</blockquote>
<p>b. 创建VLAN 20接口并在192.168.20.0/24网络内分配一个IP地址。</p>
<blockquote>
<p>SW-A(config)#interface vlan 20
SW-A(config-if)#ip address 192.168.20.1 255.255.255.0</p>
</blockquote>
<p><strong>步骤2：在所有其他交换机上启用相同的管理VLAN。</strong></p>
<p>a. 在SW-B、SW-1、SW-2和中央交换机上创建管理VLAN。</p>
<blockquote>
<p>Central(config)#vlan 20
Central(config-vlan)#exit</p>
</blockquote>
<blockquote>
<p>SW-1(config)#vlan 20
SW-1(config-vlan)#exit</p>
</blockquote>
<blockquote>
<p>SW-2(config)#vlan 20
SW-2(config-vlan)#exit</p>
</blockquote>
<blockquote>
<p>SW-B(config)#vlan 20
SW-B(config-vlan)#exit</p>
</blockquote>
<p>b. 在所有交换机上创建VLAN 20接口，并在192.168.20.0/24网络内分配一个IP地址。</p>
<blockquote>
<p>Central(config)#int vlan 20
Central(config-if)#ip address 192.168.20.2 255.255.255.0</p>
</blockquote>
<blockquote>
<p>SW-1(config)#int vlan 20
SW-1(config-if)#ip address 192.168.20.3 255.255.255.0</p>
</blockquote>
<blockquote>
<p>SW-2(config)#int vlan 20
SW-2(config-if)#ip address 192.168.20.4 255.255.255.0</p>
</blockquote>
<blockquote>
<p>SW-B(config)#int vlan 20
SW-B(config-if)#ip address 192.168.20.5 255.255.255.0</p>
</blockquote>
<p><strong>步骤3：连接并配置管理PC。</strong></p>
<p>将管理PC连接到SW-A的F0/1端口，并确保为其分配192.168.20.0/24网络内的可用IP地址。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212742442.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212742442.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212744001.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212744001.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>步骤4：在SW-A上确保管理PC属于VLAN 20。</strong></p>
<p>接口F0/1必须是VLAN 20的一部分。</p>
<blockquote>
<p>SW-A(config)#int f0/1
SW-A(config-if)#switchport access vlan 20
SW-A(config-if)#no shutdown</p>
</blockquote>
<p><strong>步骤5：验证管理PC与所有交换机之间的连通性</strong> 。</p>
<p>管理PC应能成功ping通SW-A、SW-B、SW-1、SW-2和中央交换机。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212745938.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212745938.png" 
             alt="请添加图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212748325.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212748325.png" 
             alt="请添加图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="第四部分使管理pc能够访问路由器r1">第四部分：使管理PC能够访问路由器R1</h3>
<p><strong>步骤1：在路由器R1上启用新的子接口。</strong></p>
<p>a. 创建子接口 <strong>g0/0.3</strong> ，并设置封装类型为 <strong>dot1q 20</strong> ，以便支持VLAN 20。</p>
<blockquote>
<p>R1(config)#int g0/0.3
R1(config-subif)#encapsulation dot1Q 20</p>
</blockquote>
<p>b. 分配192.168.20.0/24网络内的IP地址。</p>
<blockquote>
<p>R1(config)#int g0/0.3
R1(config-subif)#ip address 192.168.20.100 255.255.255.0</p>
</blockquote>
<p>步骤2：验证管理PC与R1之间的连通性。</p>
<p>务必在管理PC上配置默认网关以实现连通性。</p>
<p><strong>步骤3：启用安全性。</strong></p>
<p>虽然管理PC必须能够访问路由器，但其他任何PC都不应能够访问管理VLAN。</p>
<p>a. 创建只允许管理PC访问路由器的ACL。</p>
<blockquote>
<p>R1(config)#access-list 101 deny ip any 192.168.20.0 0.0.0.255
R1(config)#access-list 101 permit ip any any
R1(config)#access-list 102 permit ip host 192.168.20.6 any</p>
</blockquote>
<p>b. 将ACL应用到适当的接口上。</p>
<blockquote>
<p>R1(config)#int g0/0.1
R1(config-subif)#ip access-group 101 in
R1(config-subif)#int g0/0.2
R1(config-subif)#ip access-group 101 in</p>
</blockquote>
<blockquote>
<p>R1(config)#line vty 0 4
R1(config-line)#access-class 102 in</p>
</blockquote>
<p>注：可以有多种方式创建ACL来满足必要的安全要求。因此，该活动这一部分的评分基于正确的连通性需求。管理PC必须能够连接到所有交换机和路由器，而所有其他PC则不能连接到管理VLAN内的任何设备。</p>
<p><strong>步骤4：验证安全性。</strong></p>
<p>a. 验证只有管理PC可以访问路由器。使用SSH从管理PC通过用户名SSHadmin和密码ciscosshpa55登录R1。</p>
<blockquote>
<p>PC&gt; ssh -l SSHadmin 192.168.20.100</p>
</blockquote>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212750446.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212750446.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>b. 从管理PC尝试ping SW-A、SW-B和R1，是否成功？请解释结果。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212751788.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212751788.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<blockquote>
<p>VLAN20 中的设备不需要通过路由器进行路由，不受ACL的影响。</p>
</blockquote>
<p>c. 从D1尝试ping管理PC，是否成功？请解释结果。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212754164.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212754164.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<blockquote>
<p>不同 VLAN 中的设备 ping VLAN20 中的设备，必须进行路由，而路由器具有阻止所有数据包访问 192.168.20.0 目标网络的 ACL。</p>
</blockquote>
<p><strong>步骤5：检查结果。</strong></p>
<p>您的完成度应该为100%。点击“检查结果”查看反馈信息以及已完成的必要组件验证。</p>
<p>如果所有组件都看似正确，但活动仍显示未完成，则可能是由于验证ACL操作的连通性测试出现问题。</p>
<h3 id="实验脚本">实验脚本：</h3>
<p><strong>Part 2:</strong></p>
<p>SW-1、SW-2</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span><span class="lnt">4
</span><span class="lnt">5
</span><span class="lnt">6
</span><span class="lnt">7
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-powershell" data-lang="powershell"><span class="line"><span class="cl"><span class="n">连接SW</span><span class="p">-</span><span class="mf">1</span><span class="err">、</span><span class="n">SW</span><span class="p">-</span><span class="mf">2</span><span class="err">，</span><span class="n">使用交叉线路</span><span class="err">，</span><span class="n">要开端口</span>
</span></span><span class="line"><span class="cl"><span class="n">连接SW-A</span><span class="err">、</span><span class="n">PC</span><span class="err">，</span><span class="n">要开端口</span>
</span></span><span class="line"><span class="cl"><span class="n">interface</span> <span class="n">f0</span><span class="p">/</span><span class="mf">23</span>
</span></span><span class="line"><span class="cl"><span class="n">switchport</span> <span class="n">mode</span> <span class="n">trunk</span>
</span></span><span class="line"><span class="cl"><span class="n">switchport</span> <span class="n">trunk</span> <span class="n">native</span> <span class="n">vlan</span> <span class="mf">15</span>
</span></span><span class="line"><span class="cl"><span class="n">switchport</span> <span class="n">nonegotiate</span>
</span></span><span class="line"><span class="cl"><span class="n">no</span> <span class="n">shutdown</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p><strong>Part 3：</strong></p>
<p>SW-A：</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-powershell" data-lang="powershell"><span class="line"><span class="cl"><span class="n">int</span> <span class="n">f0</span><span class="p">/</span><span class="mf">1</span>
</span></span><span class="line"><span class="cl"><span class="n">switchport</span> <span class="n">access</span> <span class="n">vlan</span> <span class="mf">20</span>
</span></span><span class="line"><span class="cl"><span class="n">no</span> <span class="n">shutdown</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p>SW-1：</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span><span class="lnt">4
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-powershell" data-lang="powershell"><span class="line"><span class="cl"><span class="n">int</span> <span class="n">f0</span><span class="p">/</span><span class="mf">23</span>
</span></span><span class="line"><span class="cl"><span class="n">switchport</span> <span class="n">trunk</span> <span class="n">native</span> <span class="n">vlan</span> <span class="mf">15</span>
</span></span><span class="line"><span class="cl"><span class="n">switchport</span> <span class="n">mode</span> <span class="n">trunk</span> 
</span></span><span class="line"><span class="cl"><span class="n">switchport</span> <span class="n">nonegotiate</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p>SW-2:</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span><span class="lnt">4
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-powershell" data-lang="powershell"><span class="line"><span class="cl"><span class="n">int</span> <span class="n">f0</span><span class="p">/</span><span class="mf">23</span>
</span></span><span class="line"><span class="cl"><span class="n">switchport</span> <span class="n">trunk</span> <span class="n">native</span> <span class="n">vlan</span> <span class="mf">15</span>
</span></span><span class="line"><span class="cl"><span class="n">switchport</span> <span class="n">mode</span> <span class="n">trunk</span> 
</span></span><span class="line"><span class="cl"><span class="n">switchport</span> <span class="n">nonegotiate</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p>SW-A、B、1、2、Central：</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-powershell" data-lang="powershell"><span class="line"><span class="cl"><span class="n">vlan</span> <span class="mf">20</span>
</span></span><span class="line"><span class="cl"><span class="n">int</span> <span class="n">vlan</span> <span class="mf">20</span>
</span></span><span class="line"><span class="cl"><span class="n">ip</span> <span class="n">address</span> <span class="mf">192.168</span><span class="p">.</span><span class="py">20</span><span class="p">.</span><span class="py">XXX</span> <span class="mf">255.255</span><span class="p">.</span><span class="py">255</span><span class="p">.</span><span class="py">0</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p><strong>Part 4:</strong></p>
<p>R1：</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-powershell" data-lang="powershell"><span class="line"><span class="cl"><span class="n">int</span> <span class="n">g0</span><span class="p">/</span><span class="mf">0.3</span>
</span></span><span class="line"><span class="cl"><span class="n">encapsulation</span> <span class="n">dot1Q</span> <span class="mf">20</span>
</span></span><span class="line"><span class="cl"><span class="n">ip</span> <span class="n">address</span> <span class="mf">192.168</span><span class="p">.</span><span class="py">20</span><span class="p">.</span><span class="py">20</span> <span class="mf">255.255</span><span class="p">.</span><span class="py">255</span><span class="p">.</span><span class="py">0</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p>R1：</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt"> 1
</span><span class="lnt"> 2
</span><span class="lnt"> 3
</span><span class="lnt"> 4
</span><span class="lnt"> 5
</span><span class="lnt"> 6
</span><span class="lnt"> 7
</span><span class="lnt"> 8
</span><span class="lnt"> 9
</span><span class="lnt">10
</span><span class="lnt">11
</span><span class="lnt">12
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-powershell" data-lang="powershell"><span class="line"><span class="cl"><span class="nb">access-list</span> <span class="mf">101</span> <span class="n">deny</span> <span class="n">ip</span> <span class="n">any</span> <span class="mf">192.168</span><span class="p">.</span><span class="py">20</span><span class="p">.</span><span class="py">0</span> <span class="mf">255.255</span><span class="p">.</span><span class="py">255</span><span class="p">.</span><span class="py">0</span>
</span></span><span class="line"><span class="cl"><span class="nb">access-list</span> <span class="mf">101</span> <span class="n">permit</span> <span class="n">ip</span> <span class="n">any</span> <span class="n">any</span> 
</span></span><span class="line"><span class="cl"><span class="nb">access-list</span> <span class="mf">102</span> <span class="n">permit</span> <span class="n">ip</span> <span class="n">host</span> <span class="mf">192.168</span><span class="p">.</span><span class="py">20</span><span class="p">.</span><span class="py">6</span> <span class="n">any</span> 
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl"><span class="n">int</span> <span class="n">g0</span><span class="p">/</span><span class="mf">0.1</span>
</span></span><span class="line"><span class="cl"><span class="n">ip</span> <span class="nb">access-group</span> <span class="mf">101</span> <span class="k">in</span> 
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl"><span class="n">int</span> <span class="n">g0</span><span class="p">/</span><span class="mf">0.2</span>
</span></span><span class="line"><span class="cl"><span class="n">ip</span> <span class="nb">access-group</span> <span class="mf">101</span> <span class="k">in</span> 
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl"><span class="n">line</span> <span class="n">vty</span> <span class="mf">0</span> <span class="mf">4</span>
</span></span><span class="line"><span class="cl"><span class="nb">access-class</span> <span class="mf">102</span> <span class="k">in</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p>PC：</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-powershell" data-lang="powershell"><span class="line"><span class="cl"><span class="n">ssh</span> <span class="n">-l</span> <span class="n">SSHadmin</span> <span class="mf">192.168</span><span class="p">.</span><span class="py">20</span><span class="p">.</span><span class="py">20</span>
</span></span></code></pre></td></tr></table>
</div>
</div>]]></content:encoded>
    </item>
  </channel>
</rss>
