ceu-notes/1/PAR/assignments/t7-ej4/t7-ej4-naortega.tex

98 lines
3.0 KiB
TeX
Raw Permalink Normal View History

2022-03-21 08:48:25 +00:00
\documentclass[12pt,a4paper]{article}
\usepackage[spanish]{babel}
\usepackage{hyperref}
\usepackage{graphicx}
\usepackage{subcaption}
\title{Tema VII Ejercicio IV}
\author{Nicolás A. Ortega Froysa}
\begin{document}
\maketitle
\pagebreak
\section{Resumen}
El objetivo de esta práctica era la creación de una red que contiene dentro
varias subredes virtuales (VLAN). Éstas, además, han de estar configuradas con
el {\em port-security}, de tal modo que sólo permite entradas por ciertos
puertos con ciertas direcciones MAC.
\begin{figure}[!htb]
\centering
\begin{subfigure}[tb]{0.75\textwidth}
\centering
\includegraphics[width=0.95\linewidth]{imgs/00-ping-en-vlan.png}
\caption{Ping en VLAN.}
\label{fig:ping-en-vlan}
\end{subfigure}
\hfill
\begin{subfigure}[tb]{0.75\textwidth}
\includegraphics[width=0.95\linewidth]{imgs/01-ping-fuera-de-vlan.png}
\caption{Ping fuera de VLAN.}
\label{fig:ping-fuera-de-vlan}
\end{subfigure}
\caption{Comprobación de conectividad y configuración VLAN.}
\end{figure}
\begin{figure}[!htb]
\centering
\includegraphics[width=0.35\linewidth]{imgs/02-vlan-en-trama.png}
\caption{VLAN en trama.}
\label{fig:vlan-en-trama}
\end{figure}
\begin{figure}[!htb]
\centering
\begin{subfigure}[tb]{0.45\textwidth}
\includegraphics[width=0.95\linewidth]{imgs/03-mac-address-table-1-asir.png}
\caption{MAC address table 1-ASIR.}
\label{fig:mac-address-table-1-asir}
\end{subfigure}
\begin{subfigure}[tb]{0.45\textwidth}
\includegraphics[width=0.95\linewidth]{imgs/03-mac-address-table-1-dam.png}
\caption{MAC address table 1-DAM.}
\label{fig:mac-address-table-1-dam}
\end{subfigure}
\begin{subfigure}[tb]{0.45\textwidth}
\includegraphics[width=0.95\linewidth]{imgs/03-mac-address-table-2-asir.png}
\caption{MAC address table 2-ASIR.}
\label{fig:mac-address-table-2-asir}
\end{subfigure}
\begin{subfigure}[tb]{0.45\textwidth}
\includegraphics[width=0.95\linewidth]{imgs/03-mac-address-table-2-dam.png}
\caption{MAC address table 2-DAM.}
\label{fig:mac-address-table-2-dam}
\end{subfigure}
\begin{subfigure}[tb]{0.45\textwidth}
\includegraphics[width=0.95\linewidth]{imgs/03-mac-address-table-lab-asir.png}
\caption{MAC address table LAB-ASIR.}
\label{fig:mac-address-table-lab-asir}
\end{subfigure}
\begin{subfigure}[tb]{0.45\textwidth}
\includegraphics[width=0.95\linewidth]{imgs/03-mac-address-table-lab-dam.png}
\caption{MAC address table LAB-DAM.}
\label{fig:mac-address-table-lab-dam}
\end{subfigure}
\caption{Tablas de direcciones MAC de los {\em switches} de acceso.}
\end{figure}
\begin{figure}[!htb]
\centering
\includegraphics[width=0.55\linewidth]{imgs/04-port-security.png}
\caption{Configuración del {\em port-security}.}
\label{fig:port-security}
\end{figure}
\pagebreak
\section{Derechos de Autor y Licencia}
\noindent
Copyright \copyright\ \the\year\ Nicolás A. Ortega Froysa <nicolas@ortegas.org>\\
\\
Este documento se distribuye bajo los términos y condiciones de la licencia
Creative Commons Attribution No Derivatives 4.0 International.
\end{document}