Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Ip http server packet tracer

25/10/2021 Client: muhammad11 Deadline: 2 Day

Lab 1 Unit 1 Packet Tracer Assignment

Using the VCASTLE NetLab+, complete the following activities.

Click on the Show Lab Content button after you schedule the lab.

It is strongly suggested that you open the Lab Content in one window and the topology image in another, and arrange them side by side so you may read the instructions in one window and enter the commands in the other.

If you are using local classroom equipment you will need to implement or verify the cabling topology. For the VCASTLE Netlab+ remote lab system, the physical cable connections have already been made. Reference in the remote lab regarding connecting cables should be ignored.

Interface names may vary among network device types. The interface names shown in the topology image are consistent with those found in the lab activity document. Use the IOS show interface and show controllers commands to determine the actual interface names for the devices used in the lab pod.

When you have completed the activities, answer the questions that are within the individual labs in a Word Document. Within your submission, include your completed Lab Assignment Report. Save and name your file, "CIS204_U1_LabAssignment_LastName.docx".

You must complete the activities in the following order:

Lab 2.2.4.11: Configuring Switch Security Features
Configuring Switch Security Features
Lab 2.3.3.5: Configuring a Switch Management Address
Configuring a Switch Management Address
Lab 2.5.2.5: Troubleshooting IPv4 and IPv6 Static Routes
Troubleshooting IPv4 and IPv6 Static RoutesPreview the document

Lab – Configuring Switch Security Features

Topology

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway

R1 G0/1 172.16.99.1 255.255.255.0 N/A

S1 VLAN 99 172.16.99.11 255.255.255.0 172.16.99.1

PC-A NIC 172.16.99.3 255.255.255.0 172.16.99.1

Objectives

Part 1: Set Up the Topology and Initialize Devices

Part 2: Configure Basic Device Settings and Verify Connectivity

Part 3: Configure and Verify SSH Access on S1

 Configure SSH access.

 Modify SSH parameters.

 Verify the SSH configuration.

Part 4: Configure and Verify Security Features on S1

 Configure and verify general security features.

 Configure and verify port security.

Background / Scenario

It is quite common to lock down access and install good security features on PCs and servers. It is important that your network infrastructure devices, such as switches and routers, are also configured with security features.

In this lab, you will follow some best practices for configuring security features on LAN switches. You will only allow SSH and secure HTTPS sessions. You will also configure and verify port security to lock out any device with a MAC address not recognized by the switch.

Note: The router used with CCNA hands-on labs is a Cisco 1941 Integrated Services Router (ISR) with Cisco IOS Release 15.2(4)M3 (universalk9 image). The switch used is a Cisco Catalyst 2960 with Cisco IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands available and output produced might vary from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the correct interface identifiers.

Note: Make sure that the router and switch have been erased and have no startup configurations. If you are unsure, contact your instructor or refer to the previous lab for the procedures to initialize and reload devices.

Lab – Configuring Switch Security Features

© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 9

Required Resources

 1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)

 1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)

 1 PC (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term)

 Console cables to configure the Cisco IOS devices via the console ports

 Ethernet cables as shown in the topology

Part 1: Set Up the Topology and Initialize Devices

In Part 1, you will set up the network topology and clear any configurations if necessary.

Step 1: Cable the network as shown in the topology.

Step 2: Initialize and reload the router and switch.

If configuration files were previously saved on the router or switch, initialize and reload these devices back to their basic configurations.

Part 2: Configure Basic Device Settings and Verify Connectivity

In Part 2, you configure basic settings on the router, switch, and PC. Refer to the Topology and Addressing Table at the beginning of this lab for device names and address information.

Step 1: Configure an IP address on PC-A.

Step 2: Configure basic settings on R1.

a. Configure the device name.

b. Disable DNS lookup.

c. Configure interface IP address as shown in the Addressing Table.

d. Assign class as the privileged EXEC mode password.

e. Assign cisco as the console and vty password and enable login.

f. Encrypt plain text passwords.

g. Save the running configuration to startup configuration.

Step 3: Configure basic settings on S1.

A good security practice is to assign the management IP address of the switch to a VLAN other than VLAN 1 (or any other data VLAN with end users). In this step, you will create VLAN 99 on the switch and assign it an IP address.

a. Configure the device name.

b. Disable DNS lookup.

c. Assign class as the privileged EXEC mode password.

d. Assign cisco as the console and vty password and then enable login.

e. Configure a default gateway for S1 using the IP address of R1.

f. Encrypt plain text passwords.

Lab – Configuring Switch Security Features

© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 9

g. Save the running configuration to startup configuration.

h. Create VLAN 99 on the switch and name it Management.

S1(config)# vlan 99

S1(config-vlan)# name Management

S1(config-vlan)# exit

S1(config)#

i. Configure the VLAN 99 management interface IP address, as shown in the Addressing Table, and enable the interface.

S1(config)# interface vlan 99

S1(config-if)# ip address 172.16.99.11 255.255.255.0

S1(config-if)# no shutdown

S1(config-if)# end

S1#

j. Issue the show vlan command on S1. What is the status of VLAN 99?

k. Issue the show ip interface brief command on S1. What is the status and protocol for management interface VLAN 99?

Why is the protocol down, even though you issued the no shutdown command for interface VLAN 99?

l. Assign ports F0/5 and F0/6 to VLAN 99 on the switch.

S1# config t

S1(config)# interface f0/5

S1(config-if)# switchport mode access

S1(config-if)# switchport access vlan 99

S1(config-if)# interface f0/6

S1(config-if)# switchport mode access

S1(config-if)# switchport access vlan 99

S1(config-if)# end

m. Issue the show ip interface brief command on S1. What is the status and protocol showing for interface VLAN 99?

Note: There may be a delay while the port states converge.

Step 4: Verify connectivity between devices.

a. From PC-A, ping the default gateway address on R1. Were your pings successful?

b. From PC-A, ping the management address of S1. Were your pings successful?

c. From S1, ping the default gateway address on R1. Were your pings successful?

d. From PC-A, open a web browser and go to http://172.16.99.11. If it prompts you for a username and password, leave the username blank and use class for the password. If it prompts for secured connection, answer No. Were you able to access the web interface on S1?

e. Close the browser session on PC-A.

Note: The non-secure web interface (HTTP server) on a Cisco 2960 switch is enabled by default. A common security measure is to disable this service, as described in Part 4.

Lab – Configuring Switch Security Features

© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 9

Part 3: Configure and Verify SSH Access on S1

Step 1: Configure SSH access on S1.

a. Enable SSH on S1. From global configuration mode, create a domain name of CCNA-Lab.com.

S1(config)# ip domain-name CCNA-Lab.com

b. Create a local user database entry for use when connecting to the switch via SSH. The user should have administrative level access.

Note: The password used here is NOT a strong password. It is merely being used for lab purposes.

S1(config)# username admin privilege 15 secret sshadmin

c. Configure the transport input for the vty lines to allow SSH connections only, and use the local database for authentication.

S1(config)# line vty 0 15

S1(config-line)# transport input ssh

S1(config-line)# login local

S1(config-line)# exit

d. Generate an RSA crypto key using a modulus of 1024 bits.

S1(config)# crypto key generate rsa modulus 1024

The name for the keys will be: S1.CCNA-Lab.com

% The key modulus size is 1024 bits

% Generating 1024 bit RSA keys, keys will be non-exportable...

[OK] (elapsed time was 3 seconds)

S1(config)#

S1(config)# end

e. Verify the SSH configuration and answer the questions below.

S1# show ip ssh

What version of SSH is the switch using?

How many authentication attempts does SSH allow?

What is the default timeout setting for SSH?

Step 2: Modify the SSH configuration on S1.

Modify the default SSH configuration.

S1# config t

S1(config)# ip ssh time-out 75

S1(config)# ip ssh authentication-retries 2

How many authentication attempts does SSH allow?

What is the timeout setting for SSH?

Lab – Configuring Switch Security Features

© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 9

Step 3: Verify the SSH configuration on S1.

a. Using SSH client software on PC-A (such as Tera Term), open an SSH connection to S1. If you receive a message on your SSH client regarding the host key, accept it. Log in with admin for username and cisco for the password.

Was the connection successful?

What prompt was displayed on S1? Why?

b. Type exit to end the SSH session on S1.

Part 4: Configure and Verify Security Features on S1

In Part 4, you will shut down unused ports, turn off certain services running on the switch, and configure port security based on MAC addresses. Switches can be subject to MAC address table overflow attacks, MAC spoofing attacks, and unauthorized connections to switch ports. You will configure port security to limit the number of MAC addresses that can be learned on a switch port and disable the port if that number is exceeded.

Step 1: Configure general security features on S1.

a. Configure a message of the day (MOTD) banner on S1 with an appropriate security warning message.

b. Issue a show ip interface brief command on S1. What physical ports are up?

c. Shut down all unused physical ports on the switch. Use the interface range command.

S1(config)# interface range f0/1 – 4

S1(config-if-range)# shutdown

S1(config-if-range)# interface range f0/7 – 24

S1(config-if-range)# shutdown

S1(config-if-range)# interface range g0/1 – 2

S1(config-if-range)# shutdown

S1(config-if-range)# end

S1#

d. Issue the show ip interface brief command on S1. What is the status of ports F0/1 to F0/4?

e. Issue the show ip http server status command.

What is the HTTP server status?

What server port is it using?

What is the HTTP secure server status?

What secure server port is it using?

f. HTTP sessions send everything in plain text. You will disable the HTTP service running on S1.

S1(config)# no ip http server

g. From PC-A, open a web browser session to http://172.16.99.11. What was your result?

Lab – Configuring Switch Security Features

© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 9

h. From PC-A, open a secure web browser session at https://172.16.99.11. Accept the certificate. Log in with no username and a password of class. What was your result?

i. Close the web session on PC-A.

Step 2: Configure and verify port security on S1.

a. Record the R1 G0/1 MAC address. From the R1 CLI, use the show interface g0/1 command and record the MAC address of the interface.

R1# show interface g0/1

GigabitEthernet0/1 is up, line protocol is up

Hardware is CN Gigabit Ethernet, address is 30f7.0da3.1821 (bia

3047.0da3.1821)

What is the MAC address of the R1 G0/1 interface?

b. From the S1 CLI, issue a show mac address-table command from privileged EXEC mode. Find the dynamic entries for ports F0/5 and F0/6. Record them below.

F0/5 MAC address:

F0/6 MAC address:

c. Configure basic port security.

Note: This procedure would normally be performed on all access ports on the switch. F0/5 is shown here as an example.

1) From the S1 CLI, enter interface configuration mode for the port that connects to R1.

S1(config)# interface f0/5

2) Shut down the port.

S1(config-if)# shutdown

3) Enable port security on F0/5.

S1(config-if)# switchport port-security

Note: Entering the switchport port-security command sets the maximum MAC addresses to 1 and the violation action to shutdown. The switchport port-security maximum and switchport port-security violation commands can be used to change the default behavior.

4) Configure a static entry for the MAC address of R1 G0/1 interface recorded in Step 2a.

S1(config-if)# switchport port-security mac-address xxxx.xxxx.xxxx

(xxxx.xxxx.xxxx is the actual MAC address of the router G0/1 interface)

Note: Optionally, you can use the switchport port-security mac-address sticky command to

add all the secure MAC addresses that are dynamically learned on a port (up to the maximum set) to the switch running configuration.

5) Enable the switch port.

S1(config-if)# no shutdown

S1(config-if)# end

d. Verify port security on S1 F0/5 by issuing a show port-security interface command.

S1# show port-security interface f0/5

Lab – Configuring Switch Security Features

© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 9

Port Security : Enabled

Port Status : Secure-up

Violation Mode : Shutdown

Aging Time : 0 mins

Aging Type : Absolute

SecureStatic Address Aging : Disabled

Maximum MAC Addresses : 1

Total MAC Addresses : 1

Configured MAC Addresses : 1

Sticky MAC Addresses : 0

Last Source Address:Vlan : 0000.0000.0000:0

Security Violation Count : 0

What is the port status of F0/5?

e. From R1 command prompt, ping PC-A to verify connectivity.

R1# ping 172.16.99.3

f. You will now violate security by changing the MAC address on the router interface. Enter interface configuration mode for G0/1 and shut it down.

R1# config t

R1(config)# interface g0/1

R1(config-if)# shutdown

g. Configure a new MAC address for the interface, using aaaa.bbbb.cccc as the address.

R1(config-if)# mac-address aaaa.bbbb.cccc

h. If possible, have a console connection open on S1 at the same time that you do this step. You will see various messages displayed on the console connection to S1 indicating a security violation. Enable the G0/1 interface on R1.

R1(config-if)# no shutdown

i. From R1 privilege EXEC mode, ping PC-A. Was the ping successful? Why or why not?

j. On the switch, verify port security with the following commands shown below.

S1# show port-security

Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action

(Count) (Count) (Count)

--------------------------------------------------------------------

Fa0/5 1 1 1 Shutdown

----------------------------------------------------------------------

Total Addresses in System (excluding one mac per port) :0

Max Addresses limit in System (excluding one mac per port) :8192

S1# show port-security interface f0/5

Port Security : Enabled

Port Status : Secure-shutdown

Violation Mode : Shutdown

Aging Time : 0 mins

Lab – Configuring Switch Security Features

© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 9

Aging Type : Absolute

SecureStatic Address Aging : Disabled

Maximum MAC Addresses : 1

Total MAC Addresses : 1

Configured MAC Addresses : 1

Sticky MAC Addresses : 0

Last Source Address:Vlan : aaaa.bbbb.cccc:99

Security Violation Count : 1

S1# show interface f0/5

FastEthernet0/5 is down, line protocol is down (err-disabled)

Hardware is Fast Ethernet, address is 0cd9.96e2.3d05 (bia 0cd9.96e2.3d05)

MTU 1500 bytes, BW 10000 Kbit/sec, DLY 1000 usec,

reliability 255/255, txload 1/255, rxload 1/255

S1# show port-security address

Secure Mac Address Table

------------------------------------------------------------------------

Vlan Mac Address Type Ports Remaining Age

(mins)

---- ----------- ---- ----- -------------

99 30f7.0da3.1821 SecureConfigured Fa0/5 -

-----------------------------------------------------------------------

Total Addresses in System (excluding one mac per port) :0

Max Addresses limit in System (excluding one mac per port) :8192

k. On the router, shut down the G0/1 interface, remove the hard-coded MAC address from the router, and re-enable the G0/1 interface.

R1(config-if)# shutdown

R1(config-if)# no mac-address aaaa.bbbb.cccc

R1(config-if)# no shutdown

R1(config-if)# end

l. From R1, ping PC-A again at 172.16.99.3. Was the ping successful?

m. Issue the show interface f0/5 command to determine the cause of ping failure. Record your findings.

n. Clear the S1 F0/5 error disabled status.

S1# config t

S1(config)# interface f0/5

S1(config-if)# shutdown

S1(config-if)# no shutdown

Note: There may be a delay while the port states converge.

o. Issue the show interface f0/5 command on S1 to verify F0/5 is no longer in error disabled mode.

S1# show interface f0/5

FastEthernet0/5 is up, line protocol is up (connected)

Hardware is Fast Ethernet, address is 0023.5d59.9185 (bia 0023.5d59.9185)

Lab – Configuring Switch Security Features

© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 9

MTU 1500 bytes, BW 100000 Kbit/sec, DLY 100 usec,

reliability 255/255, txload 1/255, rxload 1/255

p. From the R1 command prompt, ping PC-A again. You should be successful.

Reflection

1. Why would you enable port security on a switch?

2. Why should unused ports on a switch be disabled?

Router Interface Summary Table

Router Interface Summary

Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface #2

1800 Fast Ethernet 0/0 (F0/0)

Fast Ethernet 0/1 (F0/1)

Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)

1900 Gigabit Ethernet 0/0 (G0/0)

Gigabit Ethernet 0/1 (G0/1)

Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)

2801 Fast Ethernet 0/0 (F0/0)

Fast Ethernet 0/1 (F0/1)

Serial 0/1/0 (S0/1/0) Serial 0/1/1 (S0/1/1)

2811 Fast Ethernet 0/0 (F0/0)

Fast Ethernet 0/1 (F0/1)

Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)

2900 Gigabit Ethernet 0/0 (G0/0)

Gigabit Ethernet 0/1 (G0/1)

Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)

Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many interfaces the router has. There is no way to effectively list all the combinations of configurations for each router class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device. The table does not include any other type of interface, even though a specific router may contain one. An example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be used in Cisco IOS commands to represent the interface.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

University Coursework Help
Top Academic Tutor
Online Assignment Help
Innovative Writer
Accounting & Finance Mentor
WRITING LAND
Writer Writer Name Offer Chat
University Coursework Help

ONLINE

University Coursework Help

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$25 Chat With Writer
Top Academic Tutor

ONLINE

Top Academic Tutor

I am a PhD writer with 10 years of experience. I will be delivering high-quality, plagiarism-free work to you in the minimum amount of time. Waiting for your message.

$38 Chat With Writer
Online Assignment Help

ONLINE

Online Assignment Help

I am an elite class writer with more than 6 years of experience as an academic writer. I will provide you the 100 percent original and plagiarism-free content.

$17 Chat With Writer
Innovative Writer

ONLINE

Innovative Writer

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$47 Chat With Writer
Accounting & Finance Mentor

ONLINE

Accounting & Finance Mentor

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$15 Chat With Writer
WRITING LAND

ONLINE

WRITING LAND

I have done dissertations, thesis, reports related to these topics, and I cover all the CHAPTERS accordingly and provide proper updates on the project.

$16 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Elephant driver or keeper crossword clue - Part 2: BRD - Emil nolde crucifixion 1912 - Notice for breach of duty to landlord of rented premises - Capstone Research Companion - Statistical approach to normality - Art- EL Anatsui - Ncea level 1 biology microorganisms - Www bizmove com other quiz - Cfitrainer net test answers - Eastern and western perspective of positive psychology - Strayer university statistics - Build an electric motor - System specification document template - Hotels close to babson college - Ancient egypt research project - How to describe snow - High dependency unit nursing skills - Claritas free zip code lookup - Business and administrative communication 11th edition pdf - Managerial economics - Locate a peer-reviewed article (related to the course content) published within the last 12 months in a peer-reviewed journal from the online library. - Advertising copywriting and layout - Why is lime water used to test for carbon dioxide - Macroeconomics - Scott herman back workout pdf - COLOSAL G - Direct Action Plan and a Carbon Tax - Timber span tables australia - Love vashikaran specialist In kARnAtAkA +91)!_#~9928097710 Top And Best Tantrik Aghori Baba - The residual interest in a corporation belongs to the - Early years planning cycle resource - Influencing Patient Care Discussion - Tony powell hose supplies - Notre dame freo map - Expand and simplify 3 3x 4 2 2x 3 - Brisbane city council noise diary - Artificial intelligence in power station ieee paper - Process strategy in operations management - Mkt 100 midterm - All of the different perspectives in psychology answers com - The necklace short story pdf - Behold a pale horse debunked - What benefits do wikis provide to companies? - Performance equation in computer architecture - Informatics and nursing sewell pdf - Credentialed vs non credentialed scan - Different southern american accents - Lead and manage team effectiveness - Feeding frenzy larry sabato - Question 6 - High school morning announcements - Broad crested weir formula - I need 1000 words to identify a natural capital sustainability problem - The final phase forum - Murder in a nutshell the frances glessner lee story - Assignment 2: Attacking Customer Churn with Text and Web Analytics - Vcaa special provisions rest breaks - How uncertainty affects capacity decisions - The hanoverians family tree - 316-a5 - Week 3 Assignment - 124 old coach road maslin beach - The driven gear in a final drive assembly is the - Write a 750-word statistical report with scope and descriptive statistics, Analysis, and recommendations. - Reference list for project - Boxhill tafe student web - Tú eres less simpático que federico - Under armour marketing strategy 2012 - Early childhood running record observation example - Watch dogs 2 lenni bunker - Personhood chart materialism - Expense reimbursement schemes red flags - What is mis en scene - Accounting - Abercrombie and fitch diversity issues - Benefits of entrepreneurship ppt - Minth group wiki - Loan advice - Writing for television radio and new media 11th edition pdf - Criminal justice trends paper - 3 8 13 18 - Sociological research proposal - Fluid mechanics with engineering applications by franzini - Www biology4kids com files systems_main html - Composition of functions worksheet - 1014(1) - Computer science - ACC week4 dis - Gram stain lab report results - Bullet the blue sky - Arthur j keown financial management pdf - Philippine normal university uniform - Cultural approaches to health - Capital gains tax summary pages - The pinewood furniture company produces chairs - Discussion 10 - Chcage005 - Paper - Guinness northern counties rochdale