ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Implementing Device Hostnames, Secured Passwords, and Spanning Tree Protocols for Network Administration

Verified

Added on  2023/06/03

|8
|1532
|427
AI Summary
As a network administrator for xAcme Technology Trade School, this guide covers the steps to implement device hostnames, secured passwords, and spanning tree protocols at remote locations and WAN areas. The guide includes device configurations for banners, passwords, and STP, with references to CCNA and CCNP certification guides.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Network administration
Student Name
Hired as a network administrator for xAcme Technology Trade School, I will be implementing
specific technologies at every remote locations and WAN areas. To begin with, I will have Springfield
where we are required to implement device hostnames, secured passwords spanning tree protocols and
banners.
Device configurations
I feel it worthy to mention that configuration of banners, hostnames, passwords and interface
descriptions cannot make switches nor routers work faster nor better. However, the above comes in
handy during maintenance and troubleshooting the network easier. Reason: it will be easier to identify a
device by name and descriptions provides informational messages which can be used to deduce some
important message.
Hostname- I randomly chose switch 2
“Hostname” hostname command is used to t set switch or router. Hostname is important
locally. That is to say that, the name does not affect the working of our networking device. However, the
host name is still important as it is used authentication in WAN. Todd advises that it is good to name a
router or switch with respect with location of operation of the networking device. Actually below is a
standard naming scheme [1], [2].
SpringfieldSw2#configure ter
SpringfieldSw2(config)#hostname Springfield-Switch2
Banner motd message
Banners come in handy when one attempts sneak into corporate’s network. The banners
announces a security notice. This may cause little freak to whoever is trying to access the
internetwork. Main banners include:
i. Login banner.
ii. MOTD banner.
iii. Exec process creation banner. [3]
Springfield-Switch2(config)#banner motd #This is our Springfield Switch#

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Banner login.
It is important to note that switches only allow motd banner but not login. Routers allow
banner login.
Passwords and security
The main five types of passwords are auxiliary, console, telnet, enable secret and enable
password. Enable password together with enable secret passcodes are used to set passcode
securing privilege mode. For our task here, we will be configuring telnet and console passwords.
And later encrypt the passwords.
Steps to implement console port VTY telnet passwords
a. Console password: console password is set with “line console 0” command. “Logging
synchronous” command is a great command that hinders annoying console messages that
disturb during coding of the device. The status messages pops but are returned back to the
router or switch before they disturb what is being typed.
i. In the global configuration, type line console 0, press Enter
ii. While in the console line interface, type “password”, followed by your desired
standard password. Press Enter
iii. Type “login”, press Enter.
iv. Type logging synchronous, Press Enter
v. Type exit [4], [5]
Document Page
b. Telnet Password: “line vty” command is used to configure telnet. Internet Operating
System classically have sixteen lines.
i. In the global configuration mode, type line vty 0 15 (these are the most 16 lines, you
can check this by typing, line vty?, then press enter)
ii. In the interface mode, type “password”, followed by your desired standard password.
Press “Enter”
iii. Type “Login”, then press Enter
iv. Type “Logging synchronous”, the n Press Enter
v. Type exit. Both console and VTY passwords have been set.
c. Encrypting the passwords
i. In the global configuration, type “Service password-encryption”. This command
encrypts switch’s passwords [6].
Example code
Springfield-Switch2>ena
Springfield-Switch2#conf ter
Springfield-Switch2(config)#line c 0
Springfield-Switch2(config-line)#pass
Springfield-Switch2(config-line)#password P@55Word098
Springfield-Switch2(config-line)#login
Springfield-Switch2(config-line)#logg sy
Springfield-Switch2(config-line)#logg synchronous
Springfield-Switch2(config-line)#exi
Springfield-Switch2(config)#line vty ?
Springfield-Switch2(config)#line vty 0 15
Springfield-Switch2(config-line)#pass
Springfield-Switch2(config-line)#password P@55Word098
Springfield-Switch2(config-line)#logi
Springfield-Switch2(config-line)#logg sy
Springfield-Switch2(config-line)#end
Springfield-Switch2#conf ter
Springfield-Switch2(config)#service password-encryption
Springfield-Switch2(config)#end
Springfield-Switch2#
Document Page
[7]
Spanning Tree Implementation
Spanning Tree Protocol denotes to a protocol that prevents network loops layer 2 devices by
ensuring that any that may tend to create a loop is shutdown. Spanning tree algorithm is used to create
a topology database after which it searches and out and blocks redundant links. The following are main
advantages of STP.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
i. Prevents Loops within our network: when there exists a number of paths available for a
device on the network, loops are likely to take place. This will cause information to be send
to a single computing device for multiple times. This is likey to cause a crash or clogging of
the network. Spanning Tree Protocol algorithm builds a diagram that restricts the number
of available paths and organizes them in a manner that data sent from one node to the
other changed. This mechanism assists devices have communications in a free manner.
ii. Prevents connection problems: spanning tree protocol provides backups that become
functional just in case the primary links experience technical faults. The backups are
promising since the STP has multiple routes from which to select. During the time when a
primary link is not functioning or works poorly, the STP closes this path and opens another
paths for it to be used.
iii. Bridging simplification: STP avoids bridging logic issue. This problem occurs when so many
computers are using the same network at the same time. Every computing device use
unique active route that approach similar network at the similar network address. This
confuses the logic of the entire network. The confusion hinders the data to go where it was
intended. STP will eradicate the confusion by creating a root bridge that access all traffic in a
network. This assures efficient information forwarding [8].
STP configuration
Making Switch 1 as the root
SpringfieldSw1>ena
SpringfieldSw1#confi ter
SpringfieldSw1(config)#spanning-tree vlan 1 root primary
SpringfieldSw1(config)#end
SpringfieldSw1#copy run start
SpringfieldSw1#
STP mode configuration
SpringfieldSw1#copy run start
SpringfieldSw1#conf ter
SpringfieldSw1(config)#spanning-tree mode pvst
SpringfieldSw1(config)#end
SpringfieldSw1#
Document Page
Reason
Per-VLAN mode is chosen because it enables faster convergence in addition to its ideal path
determination.
BPDU protection: switches communicate with each other purposely for the consequent configuration of
a network. Every switch compares the limitations in the BPDU which sends to neighboring devices with
parameters in the Bridge Protocol Data Unit which it receipts from neighboring devices.
To protect our root witch from bogus BPDU, we will use BPDU Guard technology which places a
PortFast enabled interface into disable state whenever one connects this interface to another switch or
hub.
SpringfieldSw1>ena
SpringfieldSw1#confi ter
SpringfieldSw1(config)#g0/2
SpringfieldSw1(config)#inter g0/2
SpringfieldSw1(config-if)#spanning-tree bpduguard en
SpringfieldSw1(config-if)#spanning-tree bpduguard enable
Document Page
SpringfieldSw1(config-if)#end

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
References
[1] L. Todd, Todd Lammle's CCNA IOS Commands Survival Guide, Hoboken: John Wiley & Sons, 2012.
[2] H. David, CCNP Routing and Switching SWITCH 300-115 Official Cert Guide: Exam 38 Cert,
Indianapolis: Cisco Press, 2014.
[3] T. Lammle and . Tedder, CCNA Routing and Switching Deluxe Study Guide, Hoboken: John Wiley &
Sons, 2014.
[4] S. Anthony, Interconnecting Cisco Network Devices, Part 1 (ICND1) Foundation Learning, Hoboken:
Cisco Press, 2013.
[5] O. Wendell, CCENT/CCNA ICND1 100-101 Official Cert Guide, Hoboken: Cissco Press, 2013.
[6] V. Toby and V. Anthony, Cisco A Beginner's Guide, Fifth Edition, McGraw Hill Professional, 2013.
[7] C. W. Arthur, W. G. B. and W. Dwayne, CASP CompTIA Advanced Security Practitioner Certification
Study Guide (Exam CAS-001), McGraw Hill Professional, 2012.
[8] A. C. Networking, Switched Networks Companion Guide: Switch Networ Compan Gui, Indiana Polis:
Cisco Press, 2014.
1 out of 8
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]