CCNA Lab08 Lab Note
Transcript of CCNA Lab08 Lab Note
Review from Lab 01 - Lab 07Especially Subnetting, IPv4 and IPv6 configuration, Hardening.
CCNA Routing and Switching
Introduction to Networks
Chapter 6 Skills Assessment - Packet Tracer
Topology
You will receive one of three possible topologies.
Addressing Table
Device Interface Address Subnet Mask Default
Gateway
Housing
G0/0 172.16.5.1 255.255.255.0 N/A
G0/1 192.168.5.1 255.255.255.0 N/A
Bldg1 VLAN 1 172.16.5.2 255.255.255.0
Bldg2 VLAN 1 192.168.5.252
255.255.255.0
RA1-1 NIC 172.16.5.10 255.255.255.0
RA1-2 NIC 172.16.5.11 255.255.255.0
RA2-1 NIC 192.168.5.10
255.255.255.0
RA2-2 NIC 192.168.5.11
255.255.255.0
Objectives
Perform basic device configuration tasks on a router and a switch. Configure IP addressing settings on network devices. Verify Layer 3 connectivity and troubleshoot connectivity issues.
Scenario
You are working on a network that has already been partially configured. In this assessment you will complete a set of requirements by configuring some
additional settings on the Bldg1 switch and the router. Use the knowledge that you have gained in the curriculum and labs to fulfill the requirements below.
Note: If you need a value that is not given to you, you can use any value you want. However, you must use the correct values for the default gateways in order that the hosts can communicate.
Requirements
Determine the values that are missing from the Addressing Table. Configure all devices with the missing default gateway values. Name the Bldg1 switch Bldg1. Your configuration must match this value
exactly. Secure access to all configuration lines of the Bldg1 switch. Secure access to the device configurations of the Bldg1 switch using the
encrypted password. Ensure that all plain text passwords on the Bldg1 switch are encrypted. Configure an appropriate banner on the Bldg1 switch. Configure addressing for all devices according to the Addressing Table.
Most values are provided in the table, others you must determine. Document interfaces with descriptions on the Housing router interfaces
and the Bldg1 switch virtual interface. Save your configurations. Verify connectivity between all devices. All devices should be able to
ping all of the other devices. Troubleshoot any connectivity problems.
All devices should be able to ping one another when you have successfullycompleted the activity.
ID:21
Last edited June, 2014
Version 2.1
Created in Packet Tracer 6.1 and Marvel 2.0.4All contents are Copyright © 1992-2014 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information
ROUTER CONFIGURATION
Authorized Personnel Only
User Access Verification
Password:ciscocisco
Housing>enable
Password:classclass
Housing#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Housing(config)#security passwords min-length 10
Housing(config)#line console 0
Housing(config-line)#password ciscocisco
Housing(config-line)#login
Housing(config-line)#exit
Housing(config)#line vty 0 4
Housing(config-line)#password ciscocisco
Housing(config-line)#exit
Housing(config)#line aux 0
Housing(config-line)#password ciscocisco
Housing(config-line)#exit
Housing(config)#enable secret classclass
Housing(config)#service password-encryption
Housing(config)#banner motd "Authorized Personnel Only"
Housing(config)#interface g0/0
Housing(config-if)#ip address 172.16.5.1 255.255.255.0
Housing(config-if)#no shutdown
Housing(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0,
changed state to up
Housing(config-if)#description Housing-G0/0-Bldg1-LAN
Housing(config-if)#exit
Housing(config)#interface g0/1
Housing(config-if)#ip address 192.168.5.1 255.255.255.0
Housing(config-if)#no shutdown
Housing(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet0/1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1,
changed state to up
Housing(config-if)#description Housing-G0/1-Bldg2-LAN
Housing(config-if)#exit
Housing(config)#exit
Housing#
%SYS-5-CONFIG_I: Configured from console by console
Housing#write
Building configuration...
[OK]
SWITCH CONFIGURATION
Switch>
Switch>enable
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname Bldg1
Bldg1(config)#line console 0
Bldg1(config-line)#password cisco
Bldg1(config-line)#login
Bldg1(config-line)#exit
Bldg1(config)#line vty 0 4
Bldg1(config-line)#password cisco
Bldg1(config-line)#login
Bldg1(config-line)#exit
Bldg1(config)#enable secret class
Bldg1(config)#service password-encryption
Bldg1(config)#banner motd "Authorized Personnel Only"
Bldg1(config)#interface vlan1
Bldg1(config-if)#ip address 172.16.5.2 255.255.255.0
Bldg1(config-if)#no shutdown
Bldg1(config-if)#
%LINK-5-CHANGED: Interface Vlan1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to
up
Bldg1(config-if)#description Bldg1-Housing-G0/0-LAN
Bldg1(config-if)#exit
Bldg1(config)#ip default-gateway 172.16.5.1
Bldg1(config)#exit
Bldg1#
%SYS-5-CONFIG_I: Configured from console by console
Bldg1#write
Building configuration...
[OK]
Bldg1#
IPV6 CONFIGURATION
R1>
R1>enable
R1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#ipv6 unicast
R1(config)#interface g0/0
R1(config-if)#ipv6 address 2001:db8:cafe:1::1/64
R1(config-if)#ipv6 address fe80::1 link-local
R1(config-if)#no shutdown
R1(config-if)#description R1-G0/0-S1-LAN
R1(config-if)#exit
R1(config)#interface g0/1
R1(config-if)#ipv6 address 2001:db8:cafe:2::1/64
R1(config-if)#ipv6 address fe80::1 link-local
R1(config-if)#no shutdown
R1(config-if)#description R1-G0/1-S2-LAN
R1(config-if)#exit
Secure Shell (SSH)-Hardening and TFTP backup
R1>
R1>enable
R1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#ip domain-name cisco.com
R1(config)#username admin
R1(config)#username admin privilege 15
R1(config)#username admin secret infosys322
R1(config)#crypto key generate rsa
The name for the keys will be: R1.cisco.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.
How many bits in the modulus [512]: 1024
% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]
R1(config)#ip ssh version 2
*Mar 1 0:11:17.936: %SSH-5-ENABLED: SSH 2 has been enabled
R1(config)#line vty 0 4
R1(config-line)#transport input ssh
R1(config-line)#login local
R1(config-line)#exit
R1(config)#exit
R1#
%SYS-5-CONFIG_I: Configured from console by console
R1#copy run start
Destination filename [startup-config]?
Building configuration...
[OK]
R1#copy run tftp
Address or name of remote host []? 172.16.10.2
Destination filename [R1-confg]?
Writing running-config....!!
[OK - 1213 bytes]
1213 bytes copied in 3.007 secs (403 bytes/sec)
R1#