
Lab – Implementing VLAN Security
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 7
By default, all VLANs are allowed to be carried on trunk ports. For security reasons, it is a good practice to
only allow specific desired VLANs to cross trunk links on your network.
f. Restrict the trunk port F0/1 on S1 to only allow VLANs 10 and 99.
S1(config)# interface f0/1
S1(config-if)# switchport trunk allowed vlan 10,99
g. Restrict the trunk port F0/1 on S2 to only allow VLANs 10 and 99.
h. Verify the allowed VLANs. Issue a show interface trunk command in privileged EXEC mode on both S1
and S2.
S1# show interface trunk
Port Mode Encapsulation Status Native vlan
Fa0/1 on 802.1q trunking 99
Port Vlans allowed on trunk
Fa0/1 10,99
Port Vlans allowed and active in management domain
Fa0/1 10,99
Port Vlans in spanning tree forwarding state and not pruned
Fa0/1 10,99
What is the result?
____________________________________________________________________________________
Reflection
What, if any, are the security problems with the default configuration of a Cisco switch?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Komentáře k této Příručce