Professional Documents
Culture Documents
Lab - Analysis On Management Plane
Lab - Analysis On Management Plane
10.1.1.0/24
SW1 VLAN10
Fa0/0
Fa0/5 Fa0/10 .1
PC1
.2 Fa0/2 Router
PC2 (Analyzer)
.3
Note: Your group router’s interface type/number may be different than the one shows in network map.
Switched Port Analyzer (SPAN)
• The Switched Port Analyzer (SPAN)
feature, which is sometimes called port
mirroring or port monitoring, selects
network traffic for analysis by a network
analyzer. This lab is intended to verify how
to utilize SPAN for network management
plane monitoring.
Lab Work Tasks:
IP header’s Protocol 6
number for TCP Payload
TTL Value in packets 255
sourced from router
Analyzing SSH
Base on the same network topology, apply a new Management
Plane service SSH.
Work out steps from the next page.
Analyze the SSH, and compare it with Telnet.
Fill up Table 2.
Table 2.
After the hostname is set, the active CLI will dynamically change.
To configure the router IP domain-name, use the ip domain-name domain name
command in Configuration Mode.
RouterGBC(config)#ip domain-name cisco.com
Step 2 Generate Asymmetric Keys
The router will respond with a message showing the naming convention for the keys.
a. The basic settings to allow a PC and a router to establish a SSH session is now
configured. In order to establish a SSH session, launch the SSH client from the
student PC.
The configurations will vary amongst the different SSH clients. If PuTTY is being used
as the SSH client, following these instructions. Launch the PuTTY.exe file and a pane
with various configuration options will open.
b. In the “Host Name (or IP address)” input box enter the IP address 10.1.1.1 of the
router. Next, change the protocol to “SSH”. These two values must be sent to
establish the SSH. To test the connection, press the Open command button at the
bottom of the window.
The SSH client will prompt for the local username and password that was previously
set on the router. Enter the “student” for the username and “cisco” for the password.
Analyze the SSH messages, do you see the username/password? Please fill up Table
2.
Conclusion:
Which Login type (Telnet or SSH) is secure?
And why?