Sponsor

Hiển thị các bài đăng có nhãn CCNA 2 - v7. Hiển thị tất cả bài đăng
Hiển thị các bài đăng có nhãn CCNA 2 - v7. Hiển thị tất cả bài đăng

CCNA 2: SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers

Thứ Năm, 2 tháng 4, 2020

CCNAv7: Switching, Routing, and Wireless Essentials v7.0 (SRWE)

SRWE Practice PT Skills Assessment (PTSA) - Part 2

Final PTSA Part 2

Addressing Table

DeviceInterfaceAddress and Prefix
CentralG0/0/0192.168.1.1/24
2001:db8:acad:1::1/64
fe80::1
G0/0/1192.168.2.1/24
2001:db8:acad:2::1/64
fe80::1
G0/0/210.1.0.1/30
2001:db8:acad:a::1/64
fe80::2
S0/1/010.2.0.1/30
2001:db8:acad:b::1/64
fe80::2
S0/1/110.4.0.1/30
2001:db8:acad:d::1/64
Office-1S0/1/110.4.0.2/30
2001:db8:acad:d::2/64
fe80::2
G0/0/0192.168.3.1/24
2001:db8:acad:3::1/64
fe80::1
Branch-101G0/0/0.10192.168.10.1/24
G0/0/0.100192.168.100.1/24
G0/0/0.172172.16.1.1/24
G0/0/1DHCP
2001:db8:acad:c::2/64
S0/1/010.2.0.2/30
2001:db8:acad:b::2/64
ISP RouterG0/0/010.1.0.2/24
2001:DB8:ACAD:A::2/64
G0/0/110.3.0.1/24
2001:DB8:ACAD:C::1/64
WLC-10management192.168.100.254
WLAN 10192.168.10.254/24
Server-01NIC192.168.3.122
2001:db8:acad:3::122
Internet ServerNIC203.0.113.25
2001:db8:acad:cafe:25
DNS ServerNIC198.51.100.163
2001:DB8:face::163
Management HostNIC192.168.100.23
Wireless HostNICDHCP
RADIUS serverNIC172.16.1.100/24
PC-ANIC192.168.1.10/24
2001:db8:acad:1::10/64
PC-BNIC192.168.1.11/24
2001:db8:acad:1::11/64
PC-CNIC192.168.2.20/24
2001:db8:acad:2::20/64
PC-DNIC192.168.2.11/24
2001:db8:acad:2::21/64
PC-ENIC192.168.3.30/24
2001:db8:acad:3::30/64

Objectives

In this assessment, you will configure the following:
  • Floating static and default routes in IPV4 and IPV6.
  • Host routes in IPV4 and IPV6.
  • DHCP pools and scopes.
  • Switch security including port security.
  • Enhanced LAN security with DHCP snooping, dynamic ARP inspection, PortFast, and BPDU guard.
  • Wireless LAN Controller-based wireless LAN with enterprise authentication.

Background / Scenario

Netacad PLC is reworking their network. You have been asked to prototype the network in Packet Tracer for evaluation by senior network staff.

Instructions

Part 1: Configure Switch Security

In this part of the assessment you will configure switch S1-1 with switch security features. Switch ports FastEthernet0/1 to FastEthernet0/5 are the active switch ports. Port GigabitEthernet0/1 is a dedicated link to router Central. All other ports should be secured.

Step 1: Configure VLANs

a. Configure VLAN 10 with name users.
b. Configure VLAN 999 with the name unused.

Step 2: Configure active switch ports.

On the active switch ports configure the following:
a. Configure the ports FastEthernet 01 through 05 and port GigabitEthernet 0/1 as static access ports in VLAN 10.
b. Activate port security on the ports.
  1. Configure the ports to accept a maximum of 4 MAC addresses.
  2. If a violation occurs, configure the port to drop frames from the unauthorized MAC address, log it, and send an alert.
  3. MAC addresses should be present in the MAC address table for a maximum of 10 minutes before they are removed.
  4. Ports should add the learned MAC addresses to the running configuration.
  5. Configure the MAC address of PC-A as a static address on port FastEthernet0/1.
c. Protect against DHCP snooping.
  1. Activate DHCP snooping globally.
  2. Activate DHCP snooping for the two VLANs that you configured.
  3. Configure the ports to limit the rate to 5 DHCP packets per second.
  4. Configure the port that links to the router as trusted.
d. Guard against ARP attacks by implementing DAI.
  1. Activate DA globally.
  2. Activate Dal on the two VLANs.
  3. Configure the port that links to the router as trusted.
e. Secure STP by configuring PortFast and BPDUGuard
f. Mitigate STP attacks by configuring BPDUguard and PortFast on the active ports.

Step 3: Secure unused switch ports.

a. Move all unused switch ports to VLAN 999.
b. Configure all unused switch ports as static access ports.
C. Deactivate all unused switch ports.

Part 2: Configure Addressing and DHCP

You will configure DHCP and interface addressing on Branch-101 to prepare for implementing the wireless LAN controller network.

Step 1: Configure and address a subinterface for the WLAN user network.

a. Configure subinterface 10 on the router interface that is connected to the switch S4-1.
b. The router should provide router-on-a-stick routing to VLAN 10.
C. Configure the subinterface with the address from the Addressing Table.

Step 2: Configure a DHCP pool for WLAN user network.

a. Exclude the router interface address and the management address of the WLC.
b. Configure a DHCP pool that will be used by hosts that are connecting to the WLAN.
  1. Name the pool WLAN-hosts.
  2. Configure the pool to use addresses in the 192.168.10.0/24 network.
  3. The pool should also provide the default gateway and DNS server addresses.

Step 3: Configure an interface as a DHCP client.

On ERROR: VARIABLE NOT FOUND [[Cld_router-names]], configure the interface that is connected to the cloud to receive its address over DHCP.

Part 3: Configure Static Routes

In this part of the assessment you will configure static, default, floating static, and host routes in both IPv4 andl Pv6. You will configure the Central and Branch-101 routers. Netacad PLC has decided that it wants to use static routing between all its networks. In addition, the company wants to use the Ethernet links between routers for most data traffic and reserve serial link between Central and Branch-101 for backup purposes in case one of the Ethernet links becomes unavailable. You will be configuring floating static and default routes.

Step 1: Configure static routes on Central.

a. Configure IPv4 default routes to the cloud using the Ethernet link as the preferred link and the serial link as the backup. Use an administrative distance of 10 for the backup route. These routes should be directly connected. Note: Ethernet interfaces will give a warning when configured without a next-hop address. In this configuration, the interface is point-to point, so the warning can be ignored.
b. Configure IPv6 default routes to the cloud. Use the Ethernet link as the primary route, and the serial link as backup. Use an administrative distance of 10 for the backup route. These routes should specify the next hop interface address.
c. Configure IPv4 static routes to the Remote Office LAN WLAN user network following the same guidelines as above for type of route and administrative distance.
d. Configure IPv4 and IPv6 host routes on Central to the Server-01 on the Remote Office LAN. Create a directly connected route for IPv4 and a next-hop route for IPv6.

Step 2: Configure static routes on Branch-101.

Branch-101 must also be configured with static routes to the other three networks in the Netacad PLC network. It will require floating static and default routes in IPv4 and IPv6 following the same guidelines as were used for the Central static routes.
  • IPv6 routes use next-hop address arguments.
  • IPv4 routes use exit interface arguments.
  • All routes should prefer the Ethernet links over the serial link.
  • Backup floating routes use an administrative distance of 10.
a. Configure IPv4 default routes to the cloud using the Ethernet link as the preferred link and the serial link as the backup.
b. Configure IPv6 default routes to the cloud. Use the Ethernet link as the primary route, and the serial link as backup. Use an administrative distance of 10 for the backup route. These routes should specify the next hop interface address.

Part 4: Configure a Wireless LAN using a Wireless LAN Controller

In this part of the assessment, you will configure the wireless LAN controller to provide access wireless access to the network. Username and password are the default admin/admin.

Step 1: Configure a VLAN interface.

a. Create a new interface and name it WLAN 10. The interface should use VLAN 10.
b. Use the information in the addressing table to configure the addressing settings for the interface. The interface will be using a DHCP pool that will be assign addresses on the network configured on the subinterface assigned to VLAN 10 on router Branch-101

Step 2: Configure a RADIUS server.

a. Configure the WLC with the RADIUS server IPv4 address
b. Use a shared secret of RADsecret.

Step 3: Configure a Wireless LAN.

a. Create a new WLAN. Name it WLAN 10 and configure the SSID as SSID-10.
b. Configure the WLAN to use the WPA2 security policy and dot1x Authentication Key Management.
c. Configure the WLAN to use the RADIUS server that was previously configured to authenticate wireless users.
d. Open the Advanced tab and scroll down to the Flexconnect sections. Activate FlexConnect Local Switching and FlexConnect Local Auth.
e. Verify that the WLAN is configured and operational.

Step 4: Configure a DHCP scope for the management network.

Configure a new DHCP scope to be used by the LAPS and other management devices on the network.
a. Name the DHCP scope Wired Admin.
b. Start the scope at address 192.168.100.240. End the scope at address 192.168.100.249.
c. Other information that is required can be found in the Addressing Table.

Step 5: Configure an SNMP server.

Configure an SNMP server to receive traps from the WLC.
a. Use the community name branch-wireless.
b. Use 172.16.1.100 as the server address.

Step 6: Configure the wireless host.

Configure the Laptop to connect to the WLAN.
a. Create a new wireless profile on the host. Use the name work net for the profile.
b. Configure the profile for the SSID of the WLAN.
c. Use enterprise authentication with a username of user1 and password of user1Pass.
d. When you are finished, click “Connect to Network.”

Intructions – Answers

Part 1 + 2 + 3 (Instructions)

Sw-A Switch

en
config t
vlan 10
name users
vlan 999
ununsed
exit

interface range f0/1-5, g0/1
switchport mode access
switchport access vlan 10

interface range f0/1-5
switchport port-security
switchport port-security maximum 4
switchport port-security violation restrict
switchport port-security aging time 10
switchport port-security mac-address sticky
exit

interface f0/1
switchport port-security mac-address 00D0.D3DC.2825
exit

ip dhcp snooping 
ip dhcp snooping vlan 10,999
interface range f0/1-5, g0/1
ip dhcp snooping limit rate 5
exit
interface g0/1
ip dhcp snooping trust
exit

ip arp inspection vlan 10,999
interface g0/1
ip arp inspection trust
exit

interface range f0/1-5
spanning-tree portfast
spanning-tree bpduguard enable

interface range f0/6-24, g0/2
switchport mode access
switchport access vlan 999
shutdown

Branch-101 Router

en
config t
interface g0/0/0.10
description WLAN users
encapsulation dot1q 10
ip address 192.168.10.1 255.255.255.0
exit

ip dhcp excluded-address 192.168.10.1
ip dhcp excluded-address 192.168.10.254
ip dhcp pool WLAN-hosts
network 192.168.10.0 255.255.255.0
default-router 192.168.10.1
dns-server 198.51.100.163
exit

interface g0/0/1
ip address dhcp

Central Router

enable
conf t
ip route 0.0.0.0 0.0.0.0 g0/0/2
ip route 0.0.0.0 0.0.0.0 s0/1/0 10
ipv6 route ::/0 2001:DB8:ACAD:A::2
ipv6 route ::/0 2001:db8:acad:b::2 10
ip route 192.168.10.0 255.255.255.0 g0/0/2
ip route 192.168.10.0 255.255.255.0 s0/1/0 10
ip route 192.168.3.122 255.255.255.255 s0/1/1
ipv6 route 2001:db8:acad:3::122/128 2001:db8:acad:d::2

Branch-101 Router

enable 
configure terminal 
ip route 0.0.0.0 0.0.0.0 g0/0/1
ip route 0.0.0.0 0.0.0.0 s0/1/0 10
ipv6 route ::/0 2001:DB8:ACAD:C::1
ipv6 route ::/0 2001:DB8:ACAD:B::1 10

Part 4: Configure a Wireless LAN using a Wireless LAN Controller (Instructions)

Step 1: Configure a VLAN interface.

Step 2: Configure a RADIUS server.

Step 3: Configure a Wireless LAN.

Step 4: Configure a DHCP scope for the management network.

Step 5: Configure an SNMP server.

Step 6: Configure the wireless host.

Read more ...

CCNA 2: SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers

Thứ Năm, 2 tháng 4, 2020

CCNAv7: Switching, Routing, and Wireless Essentials v7.0 (SRWE)

Final PTSA Part 1

    A few things to keep in mind while completing this activity:
  • 1. Do not use the browser Back button or close or reload any exam windows during the exam.
  • 2. Do not close Packet Tracer when you are done. It will close automatically.
  • 3. Click the Submit Assessment button in the browser window to submit your work.

Introduction

In this assessment you are configuring a network that is using EtherChannel and routing between VLANs. For the sake of time, you will not be asked to perform all configurations on all network devices as you may be required to do in a real network or other assessment. Instead, you will use the skills and knowledge that you have learned in the labs in this course to configure the router and switches in the topology. In addition to EtherChannel and inter-VLAN routing, this task involves creating VLANs and trunks, and performing basic router and switch configuration.
You are not required to configure host addressing.
You will practice and be assessed on the following skills:
  • Configuration of initial settings on a router.
  • Configuration of initial settings on a switch, including SVI and SSH.
  • Configuration of VLANs.
  • Configuration of switchport VLAN membership.
  • EtherChannel configuration.
  • Troubleshooting VLANs.
  • Configuration of static trunking and DTP.
  • Configuration of routing between VLANs on a Layer 3 switch
  • Configuration of router-on-a-stick inter- VLAN routing on a router.
  • Configure default gateways on hosts.
Addressing Table
DeviceInterfaceIP AddressSubnet Mask
R-1G0/0/0192.168.0.1255.255.255.0
G0/0/1.40 192.168.40.1255.255.255.0
G0/0/1.50 192.168.50.1255.255.255.0
G0/0/1.60 192.168.60.1255.255.255.0
G0/0/1.99 192.168.99.17255.255.255.240
S0/1/0209.165.201.2255.255.255.252
MULTI-1G1/1/1192.168.0.2255.255.255.0
VLAN10192.168.10.1255.255.255.0
VLAN20192.168.20.1255.255.255.0
VLAN30192.168.30.1255.255.255.0
VLAN99192.168.99.2255.255.255.240
S-3VLAN99192.168.99.18255.255.255.240
Host 1NIC192.168.10.10255.255.255.0
Host 2NIC192.168.20.20255.255.255.0
Host 3NIC192.168.30.30255.255.255.0
Host 4NIC192.168.10.11255.255.255.0
Host 5NIC192.168.20.21255.255.255.0
Host 6NIC192.168.30.31255.255.255.0
Host 7NIC192.168.40.40255.255.255.0
Host 8NIC192.168.50.50255.255.255.0
Host 9NIC192.168.60.60255.255.255.0
Admin HostNIC192.168.99.19255.255.255.0
Wed ServerNIC203.0.113.100255.255.255.0
VLAN Table
VLANNameIP NetworkSubnet MaskDevices
10B1F1192.168.10.0255.255.255.0MULTI-1, S-1, S-2
20B1F2192.168.20.0255.255.255.0MULTI-1, S-1, S-2
30B1F4192.168.30.0255.255.255.0MULTI-1, S-1, S-2
40B3192.168.40.0255.255.255.0S-3
50B4192.168.50.0255.255.255.0S-3
60B5192.168.60.0255.255.255.0S-3
99NetAdmin192.168.99.16255.255.255.240S-3
Port to VLAN Assignment Table
DeviceVLANVLAN NamePort Assignments
S-110B1F1F0/7-10
20B1F2F0/11-15
30B1F4F0/16-24
S-210B1F1F0/7-10
20B1F2F0/11-15
30B1F4F0/16-24
S-340B3F0/1-5
50B4F0/6-10
60B5F0/11-15
99NetAdmin NativeF0/24

Background / Scenario

A corporation is planning to implement EtherChannel and a new VLAN design in order to make the network more efficient. You have been asked to work on a design and prototype of the new network. You have created the logical topology and now need to configure the devices in order to evaluate the design. You will configure VLANs and access port VLAN membership on access layer switches. You will also configure EtherChannel and trunking. Finally, you will configure a router and a Layer 3 switch to route between VLANs. Some addressing had already been configured.

Instructions

Part 1: Basic Router Configuration

Step 1: Configure router R-1 with required settings.

a. Open a command window on router R-1 and move to privileged EXEC mode
b. Copy and paste the following configuration into the R-1 router CLI.
ip route 192.168.10.0 255.255.255.0 GigabitEthernet0/0/0 
ip route 192.168.20.0 255.255.255.0 GigabitEthernet0/0/0 
ip route 192.168.30.0 255.255.255.0 GigabitEthernet0/0/0
ip route 192.168.99.0 255.255.255.240 Gigabit Ethernet0/0/0
Be sure to press the key after the last line to return to privileged EXEC mode prompt.
c. Configure the following settings on the router
– The enable secret password.
– A console password
– Remote access to the VTY lines.
– A banner MOTD message.
– The device hostname according to the value in the addressing table.
– All clear text passwords should be encrypted.
– Interface addressing on g0/0/0 and s0/1/0
– Interface descriptions on g0/0/0 and s0/1/0.
Note: Be sure to make a record of the passwords that you create.

Part 2: Basic Switch Configuration

Step 1: Configure Remote Management Addressing

a. Configure SVI 99 on switch S-3 with IP addressing according to the Addressing Table
b. The S-3 switch SVI should be reachable from other networks.

Step 2: Configure Secure Remote Access

a. Configure SSH as follows:
– Username: admin password: C1sco123!
– Modulus bits 1024
– All VTY lines should accept SSH connections only
– Connections should require the previously configured username and password.
– IP domain name: acad.pt
b. Test SSH connectivity to ensure that all necessary settings have been configured. If unable to connect, correct any issues and verify connectivity

Part 3: VLAN Configuration

Step 1: Configure VLANs according to the VLAN table.

Use the VLAN Table to create and name the VLANs on the appropriate switches.

Step 2: Assign switch ports to VLANs.

Assign VLAN membership to static access switchports according to the Port to VLAN Assignment table.

Part 4: EtherChannel and Trunking Configuration

EtherChannel Port Assignments Table

Step 1: Configure EtherChannels

Create EtherChannels according to the EtherChannel Port Assignments Table. Use the Cisco LACP protocol. Both sides of the channel should form the channel without negotiation

Step 2: Configure Trunking on the EtherChannels

a. Configure the port channel interfaces as static trunks. Disable DTP negotiation on all trunks
b. Troubleshoot any issues that prevent the formation of the EtherChannels.
Note: Packet Tracer requires configuration of trunking and DTP mode on both portchannel interfaces and the component physical interfaces.

Step 3: Configure a static trunk uplink

a. On the S-3 switch, configure the port that is connected to R-1 g0/0/0 as a static trunk b. Configure the NetAdmin VLAN as the native VLAN c. Disable DTP on the port.

Part 5: Configure Inter-VLAN Routing

Step 1: Configure inter-VLAN routing on the Layer 3 switch

a. Configure Inter-VLAN routing on the MULTI-1 Layer 3 switch for all VLANs in the VLAN Table that are configured on MULTI-1.
b. Configure the switchport on MULTI-1 that is connected to R-1 with an IP address as shown in the Addressing Table

Step 2: Configure router-on-a-stick inter-VLAN routing on a router.

a. Configure inter-VLAN routing on R-1 for all the VLANs that are configured on the S-3 switch. Use the information in the Addressing Table
b. Be sure to configure descriptions of all interfaces

Step 3: Configure default gateways on hosts.

a Configure default gateway addresses on all hosts on the LANs.
b. Verify connectivity between all hosts on both LANs with each other and the Web Server server
c. Verify that a host can connect to the SVI of switch S-2 over SSH.

Intructions – Answers

Router R-1

en
conf t
ip route 192.168.10.0 255.255.255.0 GigabitEthernet0/0/0
ip route 192.168.20.0 255.255.255.0 GigabitEthernet0/0/0
ip route 192.168.30.0 255.255.255.0 GigabitEthernet0/0/0
ip route 192.168.99.0 255.255.255.240 GigabitEthernet0/0/0
no ip domain lookup

enable secret Password
line console 0
password Password
login
exit
line vty 0 4
password Password
login
exit
banner motd #Authorized Access Only!#
hostname R-1
service password-encryption
interface g0/0/0
ip address 192.168.0.1 255.255.255.0
no shutdown
description "R1 G0/0/0"
exit
interface s0/1/0
ip address 209.165.201.2 255.255.255.252
no shutdown
description "R1 S0/1/0"
exit

interface g0/0/1.40
description "Gateway for VLAN40"
encapsulation dot1q 40
ip address 192.168.40.1 255.255.255.0
exit
interface g0/0/1.50
description "Gateway for VLAN50"
encapsulation dot1q 50
ip address 192.168.50.1 255.255.255.0
exit
interface g0/0/1.60
description "Gateway for VLAN60"
encapsulation dot1q 60
ip address 192.168.60.1 255.255.255.0
exit
interface g0/0/1.99
description "Gateway for VLAN99"
encapsulation dot1q 99 native
ip address 192.168.99.17 255.255.255.240
end
copy running-config startup-config

S-3 Switch

en
config t
interface vlan 99
ip address 192.168.99.18 255.255.255.240
no shutdown
exit
ip default-gateway 192.168.99.17
ip domain-name acad.pt
crypto key generate rsa
1024
username admin password C1sco123!
enable secret Password
line vty 0 15
transport input ssh
login local
exit
ip ssh version 2

vlan 40
name B3
exit
interface vlan 40
ip address 192.168.40.1 255.255.255.0
description B3
exit
vlan 50
name B4
exit
interface vlan 50
ip address 192.168.50.1 255.255.255.0
description B4
exit
vlan 60
name B5
exit
interface vlan 60
ip address 192.168.60.1 255.255.255.0
description B5
exit
vlan 99
name NetAdmin
exit
interface vlan 99
ip address 192.168.99.18 255.255.255.240
description NetAdmin
exit

interface range f0/1-5
switchport mode access
switchport access vlan 40
exit
interface range f0/6-10
switchport mode access
switchport access vlan 50
exit
interface range f0/11-15
switchport mode access
switchport access vlan 60
exit
interface f0/24
switchport mode access
switchport access vlan 99
exit
interface g0/1
switchport nonegotiate
switchport mode trunk
switchport trunk allowed vlan 40,50,60,99
switchport trunk native vlan 99
end
copy running-config startup-config

MULTI-1 Switch

en
config t
vlan 10
name B1F1
interface vlan 10
description B1F1
ip address 192.168.10.1 255.255.255.0
exit
vlan 20
name B1F2
interface vlan 20
description B1F2
ip address 192.168.20.1 255.255.255.0
exit
vlan 30
name B1F4
interface vlan 30
description B1F4
ip address 192.168.30.1 255.255.255.0
exit

ip routing
interface g1/1/1
no switchport
ip address 192.168.0.2 255.255.255.0
end
copy running-config startup-config

en
config t
interface range g1/0/1-2
channel-group 1 mode active
exit
interface port-channel 1
switchport mode trunk
switchport trunk allowed vlan 10,20,30
exit
interface range g1/0/3-4
channel-group 2 mode active
exit
interface port-channel 2
switchport mode trunk
switchport trunk allowed vlan 10,20,30
end
copy running-config startup-config

S-1 Switch

vlan 10
name B1F1
interface vlan 10
description B1F1
exit
vlan 20
name B1F2
interface vlan 20
description B1F2
exit
vlan 30
name B1F4
interface vlan 30
description B1F4
exit

interface range f0/7-10
switchport mode access
switchport access vlan 10
exit
interface range f0/11-15
switchport mode access
switchport access vlan 20
exit
interface range f0/16-24
switchport mode access
switchport access vlan 30
end
copy running-config startup-config

en
config t
interface range g0/1-2
channel-group 1 mode active
exit
interface port-channel 1
switchport mode trunk 
switchport nonegotiate
exit
interface range f0/5-6
channel-group 3 mode active
exit
interface port-channel 3
switchport mode trunk 
switchport nonegotiate
end
copy running-config startup-config

S-2 Switch

en
config t
vlan 10
name B1F1
interface vlan 10
description B1F1
exit
vlan 20
name B1F2
interface vlan 20
description B1F2
exit
vlan 30
name B1F4
interface vlan 30
description B1F4
exit

interface range f0/7-10
switchport mode access
switchport access vlan 10
exit
interface range f0/11-15
switchport mode access
switchport access vlan 20
exit
interface range f0/16-24
switchport mode access
switchport access vlan 30
end
copy running-config startup-config

en
config t
interface range g0/1-2
channel-group 2 mode active
exit
interface port-channel 2
switchport mode trunk 
switchport nonegotiate
exit
interface range f0/5-6
channel-group 3 mode active
exit
interface port-channel 3
switchport mode trunk 
switchport nonegotiate
end
copy running-config startup-config
Read more ...

Advertisment