Question: can u provide command for the same please Addressing TableAddressing Table Device Interface IP Address Subnet Mask Default Gateway R 1 G 0 / 0

can u provide command for the same please
Addressing TableAddressing Table
Device Interface IP Address Subnet Mask Default Gateway
R1 G0/0
G0/1
G0/210.1.1.1
172.16.1.1
1.1.1.2255.255.255.252
255.255.255.252
255.255.255.252
R2 G0/0
G0/1
G0/1.5
G0/1.10
G0/1.10010.1.1.2
n/a
10.2.5.1
10.2.10.1
10.2.100.1255.255.255.252
255.255.255.0
255.255.255.0
255.255.255.0
R3 G0/0
G0/1
10.3.1.1
172.16.1.2
255.255.255.252
255.255.255.252
S2 G0/110.2.10.2255.255.255.010.2.10.1
PC1 NIC 10.2.50.2255.255.255.010.2.10.1
PC2 NIC 10.2.50.3255.255.255.010.2.10.1
PC3 NIC 10.2.100.2255.255.255.010.2.10.1
PC4 NIC 10.2.100.3255.255.255.010.2.10.1
Review Logical Topology and table document
IMPORTANT: ISP router has been pre-configured you do not need to do any configurations
R1, R2, & R3 have been pre-configured with NAT and RIP which is a routable protocol-
DO Not remove
Tasks (-2/ mistake) Marks
On S2, configure VLANs and the Management SVI.
Configure and name the VLANs as indicated in the topology diagram.
Assign the management IP address VLAN 1010.2.10.2/24 and configure its default gateway (10.2.10.1)./8
On S2, configure interfaces.
Interfaces F0/1 through F0/9 should be access ports, assigned to VLAN 50.
Interfaces F0/10 through F0/19 should be access ports, assigned to VLAN 100.
Interfaces F0/20 F0/24 and G0/2 should be access ports, assigned to VLAN 999, and disabled. /10
On S2, configure port security
Enable port security on F0/1 through F0/19.
Connect a maximum of 2 MAC addresses.
Secure the ports so that the MAC address of a device is dynamically learned and added to the running configuration.
Set the port security violation to Restrict
On S2, configure trunking
Configure VLAN 5 as the native VLAN for G0/1
On S2, configure DHCP snooping
Enable DCHP snooping for Vlans 5,10,50,100
On S2, set the domain name and generate secure keys
Configure the domain name to netacad.pka
Secure keys needed to encrypt data, generate the RSA keys using 1024
On S2, create an SSH user and reconfigure for the VTY lines for SSH-only access
Create an administrator user with cisco as the secret password
Configure VTY lines to check the local username database for login credentials and to only allow SSH for remote access /25
On R2 and S2, configure Router-on-a-Stick Inter-VLAN routing
Configure R2 inter-VLAN routing for VLANs 5(native),10,50, and 100 using 802.1Q links.
Configure S2 G0/1 to support inter-VLAN routing trunking using VLAN 5 as the native VLAN. /10
On R2, enable DHCP services. -12 marks (NOTE: Do not use DHCP Relay agent, it is not necessary for this topology).
Create two DHCP pools called STAFF-POOL and USER-POOL be exact for the names.
Assign network address, subnet mask, and default gateway for the Staff and User VLANs. (refer to VLAN subnets IP addressing in the VLAN table on 1st page)
Exclude the first 6 addresses of each pool.
PC1 and PC2 should get a VLAN 50 IP address IP configuration.
PC3 and PC4 should get a VLAN 100 IP address IP configuration./12
On R1, R2, R3, and SVR, configure interfaces.
Interfaces must be configured accurately and active as identified in the logical topology.
Ping directly connected interfaces. /4
On R1, R2, R3, and S2, configure management features. (no need to configure Line console 0)
Assign class as the privileged EXEC encrypted password.
Create a banner warning that Unauthorized access is prohibited be exact for this text input. /6
Verify Connectivity
All PCs and SVR should be able to reach 8.8.8.8
can u provide command for the same please

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!