CCNA Lab08 Lab Note

11
Review from Lab 01 - Lab 07 Especially Subnetting, IPv4 and IPv6 configuration, Hardening. CCNA Routing and Switching Introduction to Networks Chapter 6 Skills Assessment - Packet Tracer Topology You will receive one of three possible topologies. Addressing Table Device Interfa ce Address Subnet Mask Default Gateway Housin g G0/0 172.16.5.1 255.255.255 .0 N/A G0/1 192.168.5.1 255.255.255 .0 N/A Bldg1 VLAN 1 172.16.5.2 255.255.255 .0 Bldg2 VLAN 1 192.168.5.2 52 255.255.255 .0 RA1-1 NIC 172.16.5.10 255.255.255 .0 RA1-2 NIC 172.16.5.11 255.255.255 .0 RA2-1 NIC 192.168.5.1 0 255.255.255 .0 RA2-2 NIC 192.168.5.1 1 255.255.255 .0 Objectives Perform basic device configuration tasks on a router and a switch. Configure IP addressing settings on network devices. Verify Layer 3 connectivity and troubleshoot connectivity issues. Scenario You are working on a network that has already been partially configured. In this assessment you will complete a set of requirements by configuring some

Transcript of CCNA Lab08 Lab Note

Review from Lab 01 - Lab 07Especially Subnetting, IPv4 and IPv6 configuration, Hardening.

CCNA Routing and Switching

Introduction to Networks

Chapter 6 Skills Assessment - Packet Tracer

Topology

You will receive one of three possible topologies.

Addressing Table

Device Interface Address Subnet Mask Default

Gateway

Housing

G0/0 172.16.5.1 255.255.255.0 N/A

G0/1 192.168.5.1 255.255.255.0 N/A

Bldg1 VLAN 1 172.16.5.2 255.255.255.0

Bldg2 VLAN 1 192.168.5.252

255.255.255.0

RA1-1 NIC 172.16.5.10 255.255.255.0

RA1-2 NIC 172.16.5.11 255.255.255.0

RA2-1 NIC 192.168.5.10

255.255.255.0

RA2-2 NIC 192.168.5.11

255.255.255.0

Objectives

Perform basic device configuration tasks on a router and a switch. Configure IP addressing settings on network devices. Verify Layer 3 connectivity and troubleshoot connectivity issues.

Scenario

You are working on a network that has already been partially configured. In this assessment you will complete a set of requirements by configuring some

additional settings on the Bldg1 switch and the router. Use the knowledge that you have gained in the curriculum and labs to fulfill the requirements below.

Note: If you need a value that is not given to you, you can use any value you want. However, you must use the correct values for the default gateways in order that the hosts can communicate.

Requirements

Determine the values that are missing from the Addressing Table. Configure all devices with the missing default gateway values. Name the Bldg1 switch Bldg1. Your configuration must match this value

exactly. Secure access to all configuration lines of the Bldg1 switch. Secure access to the device configurations of the Bldg1 switch using the

encrypted password. Ensure that all plain text passwords on the Bldg1 switch are encrypted. Configure an appropriate banner on the Bldg1 switch. Configure addressing for all devices according to the Addressing Table.

Most values are provided in the table, others you must determine. Document interfaces with descriptions on the Housing router interfaces

and the Bldg1 switch virtual interface. Save your configurations. Verify connectivity between all devices. All devices should be able to

ping all of the other devices. Troubleshoot any connectivity problems.

All devices should be able to ping one another when you have successfullycompleted the activity.

ID:21

Last edited June, 2014

Version 2.1

Created in Packet Tracer 6.1 and Marvel 2.0.4All contents are Copyright © 1992-2014 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information

ROUTER CONFIGURATION

Authorized Personnel Only

User Access Verification

Password:ciscocisco

Housing>enable

Password:classclass

Housing#configure terminal

Enter configuration commands, one per line. End with CNTL/Z.

Housing(config)#security passwords min-length 10

Housing(config)#line console 0

Housing(config-line)#password ciscocisco

Housing(config-line)#login

Housing(config-line)#exit

Housing(config)#line vty 0 4

Housing(config-line)#password ciscocisco

Housing(config-line)#exit

Housing(config)#line aux 0

Housing(config-line)#password ciscocisco

Housing(config-line)#exit

Housing(config)#enable secret classclass

Housing(config)#service password-encryption

Housing(config)#banner motd "Authorized Personnel Only"

Housing(config)#interface g0/0

Housing(config-if)#ip address 172.16.5.1 255.255.255.0

Housing(config-if)#no shutdown

Housing(config-if)#

%LINK-5-CHANGED: Interface GigabitEthernet0/0, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0,

changed state to up

Housing(config-if)#description Housing-G0/0-Bldg1-LAN

Housing(config-if)#exit

Housing(config)#interface g0/1

Housing(config-if)#ip address 192.168.5.1 255.255.255.0

Housing(config-if)#no shutdown

Housing(config-if)#

%LINK-5-CHANGED: Interface GigabitEthernet0/1, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1,

changed state to up

Housing(config-if)#description Housing-G0/1-Bldg2-LAN

Housing(config-if)#exit

Housing(config)#exit

Housing#

%SYS-5-CONFIG_I: Configured from console by console

Housing#write

Building configuration...

[OK]

SWITCH CONFIGURATION

Switch>

Switch>enable

Switch#configure terminal

Enter configuration commands, one per line. End with CNTL/Z.

Switch(config)#hostname Bldg1

Bldg1(config)#line console 0

Bldg1(config-line)#password cisco

Bldg1(config-line)#login

Bldg1(config-line)#exit

Bldg1(config)#line vty 0 4

Bldg1(config-line)#password cisco

Bldg1(config-line)#login

Bldg1(config-line)#exit

Bldg1(config)#enable secret class

Bldg1(config)#service password-encryption

Bldg1(config)#banner motd "Authorized Personnel Only"

Bldg1(config)#interface vlan1

Bldg1(config-if)#ip address 172.16.5.2 255.255.255.0

Bldg1(config-if)#no shutdown

Bldg1(config-if)#

%LINK-5-CHANGED: Interface Vlan1, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to

up

Bldg1(config-if)#description Bldg1-Housing-G0/0-LAN

Bldg1(config-if)#exit

Bldg1(config)#ip default-gateway 172.16.5.1

Bldg1(config)#exit

Bldg1#

%SYS-5-CONFIG_I: Configured from console by console

Bldg1#write

Building configuration...

[OK]

Bldg1#

IPV6 CONFIGURATION

R1>

R1>enable

R1#configure terminal

Enter configuration commands, one per line. End with CNTL/Z.

R1(config)#ipv6 unicast

R1(config)#interface g0/0

R1(config-if)#ipv6 address 2001:db8:cafe:1::1/64

R1(config-if)#ipv6 address fe80::1 link-local

R1(config-if)#no shutdown

R1(config-if)#description R1-G0/0-S1-LAN

R1(config-if)#exit

R1(config)#interface g0/1

R1(config-if)#ipv6 address 2001:db8:cafe:2::1/64

R1(config-if)#ipv6 address fe80::1 link-local

R1(config-if)#no shutdown

R1(config-if)#description R1-G0/1-S2-LAN

R1(config-if)#exit

Secure Shell (SSH)-Hardening and TFTP backup

R1>

R1>enable

R1#configure terminal

Enter configuration commands, one per line. End with CNTL/Z.

R1(config)#ip domain-name cisco.com

R1(config)#username admin

R1(config)#username admin privilege 15

R1(config)#username admin secret infosys322

R1(config)#crypto key generate rsa

The name for the keys will be: R1.cisco.com

Choose the size of the key modulus in the range of 360 to 2048 for your

General Purpose Keys. Choosing a key modulus greater than 512 may take

a few minutes.

How many bits in the modulus [512]: 1024

% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]

R1(config)#ip ssh version 2

*Mar 1 0:11:17.936: %SSH-5-ENABLED: SSH 2 has been enabled

R1(config)#line vty 0 4

R1(config-line)#transport input ssh

R1(config-line)#login local

R1(config-line)#exit

R1(config)#exit

R1#

%SYS-5-CONFIG_I: Configured from console by console

R1#copy run start

Destination filename [startup-config]?

Building configuration...

[OK]

R1#copy run tftp

Address or name of remote host []? 172.16.10.2

Destination filename [R1-confg]?

Writing running-config....!!

[OK - 1213 bytes]

1213 bytes copied in 3.007 secs (403 bytes/sec)

R1#