CCNA Security Packet Tracer Practice SBA
CCNA Security Packet Tracer Practice SBA
CCNA Security Packet Tracer Practice SBA
This post is about CCNA Security Packet Tracer Skill Based Assessment Practice . I
would like to share with all of your the answer or solution for this CCNA Security
SBA. This CCNA Security SBA Practice contributed by Viktorcsn with 100% solution. I
hope with the answer for CCNA Security SBA provided, it will be a guideline to all of
us to understand this CCNA Security practice better. Below is the question and
answer for CCNA Security Packet Tracer SBA Practice.
configure devices to protect against STP attacks and to enable broadcast storm control
Addressing Table
Device
Internet
CORP
Branch
External
Public Svr
Interface
S0/0/0
S0/0/1
S0/1/0
Fa0/0
S0/0/0
Fa0/0
Fa0/1.10
Fa0/1.25
Fa0/1.99
S0/0/0
Fa0/0
S0/0/0
Fa0/0
NIC
IP Address
209.165.200.225
192.31.7.1
198.133.219.1
192.135.250.1
209.165.200.226
10.1.1.254
172.16.10.254
172.16.25.254
172.16.99.254
198.133.219.2
198.133.219.62
192.31.7.2
192.31.7.62
192.135.250.5
Subnet Mask
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.0
255.255.255.252
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.252
255.255.255.224
255.255.255.252
255.255.255.224
255.255.255.0
Gateway
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
192.135.250.1
DNS server
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
Device
External Web Svr
External PC
NTP/Syslog Svr
DMZ DNS Svr
DMZ Web Svr
PC0
PC1
Net Admin
Admin PC
PCB1
Interface
NIC
NIC
NIC
NIC
NIC
NIC
NIC
NIC
NIC
NIC
IP Address
192.31.7.35
192.31.7.33
172.16.25.2
10.1.1.5
10.1.1.2
172.16.10.5
172.16.10.10
172.16.25.5
198.133.219.35
198.133.219.40
Subnet Mask
255.255.255.224
255.255.255.224
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.224
255.255.255.224
Gateway
192.31.7.62
192.31.7.62
172.16.25.254
10.1.1.254
10.1.1.254
172.16.10.254
172.16.10.254
172.16.25.254
198.133.219.62
198.133.219.62
DNS server
192.135.250.5
192.135.250.5
10.1.1.5
192.135.250.5
10.1.1.5
10.1.1.5
10.1.1.5
10.1.1.5
192.135.250.5
192.135.250.5
Note: Appropriate verification procedures should be taken after each configuration task to ensure
that it has been properly implemented.
Step 1: Configure Basic Device Hardening for the CORP Router.
a. Configure the CORP router to only accept passwords with a minimum length of 10 characters.
CORP(config)# security password min-length 10
b. Configure an encrypted privileged level password of ciscoclass.
CORP(config)# enable secret ciscoclass
c. Enable password encryption for all clear text passwords in the configuration file.
CORP(config)# service password-encryption
d. Configure the console port and all vty lines with the following requirements:
Note: CORP is already configured with the username CORPADMIN and the secret password
ciscoccnas.
Note: CORP is already configured with the username SSHAccess and the secret
password ciscosshaccess.
domain name is theccnas.com
AAA authentication using the local database as the default for console line and vty lines
access
Set the maximum number of learned MAC addresses to 2 on FastEthernet ports 0/1 to
0/23. Allow the MAC address to be learned dynamically and to shutdown the port if a
violation occurs.
Only users connecting from Net Admin and Admin PC are allowed access to the vty
lines.
Net Admin can open an FTP session to the DMZ Web Svr with the username cisco and
the password cisco; and
d. Create, apply, and verify an extended named ACL (named INCORP) to control access from
the Internet into the CORP router. The ACL should be created in the order specified in the
following guidelines (Please note, the order of ACL statements is significant only because of the
scoring need in Packet Tracer.):
1. Allow HTTP traffic to the DMZ Web Svr.
2. Allow DNS traffic (both TCP and UDP) to the DMZ DNS Svr.
3. Allow SSH traffic from the Branch Office administrator workstation to the Serial 0/0/0
interface on the CORP router.
4. Allow IP traffic from the Branch router serial interface into the CORP router serial interface.
5. Allow IP traffic from the Branch Office LAN to the public IP address range that is assigned to
the CORP site (209.165.200.240/28).
PCB1 cannot establish an SSH connection to the CORP router (209.165.200.226); and
f. Create and apply a CBAC inspection rule (named INTOCORP) to inspect ICMP, TCP, and
UDP traffic between the CORP internal network and any other network.
CORP(config)# ip inspect name INTOCORP icmp
CORP(config)# ip inspect name INTOCORP tcp
CORP(config)# ip inspect name INTOCORP udp
g. Enable CBAC audit messages to be sent to the syslog server.
CORP(config)# ip inspect audit-trail
CORP(config)# interface s0/0/0
CORP(config-if)# ip inspect INTOCORP out
h. Verify the CBAC firewall configuration.
Admin PC in the Branch office can establish an SSH connection to the CORP router with
the usernameSSHAccess and password ciscosshaccess.
Create an ACL (ACL 110) to permit all protocols from the 198.133.219.32/27 network to
any destination.
Create a class map using the option of class map type inspect with the match-all keyword.
Match the ACL 110 and name the class map BR-IN-CLASS-MAP.
Create a pair of zones named IN-OUT-ZPAIR with the source as BR-IN-ZONE and
destination as BR-OUT-ZONE.
Specify the policy map BR-IN-OUT-PMAP for handling the traffic between the two
zones.
The Admin PC in the Branch office can access the URLs http://www.theccnas.com and
http://www.externalone.com.
The Admin PC in the Branch office can ping the External PC (192.31.7.33).
The Admin PC in Branch office can establish an SSH connection to the CORP router
with the usernameSSHAccess and password ciscosshaccess. If you get the Corp> prompt,
then your configuration is correct.
Step 7: Configure a Site-to-Site IPsec VPN between the CORP router and the Branch
Router.
The following tables list the parameters for the ISAKMP Phase 1 Policy and IPsec Phase 2
Policy:
ISAKMP Phase 1 Policy
Parameters
Key Distribution ISAKMP
Method
Encryption
AES
Algorithm
Number of Bits
256
Transform Set
Hash Algorithm
Authentication
Method
Key Exchange
SHA-1
Pre-share
IKE SA Lifetime
ISAKMP Key
Parameters
CORP Router
Branch Router
Transform Set
Name
VPN-SET
VPN-SET
esp-3des
esp-sha-hmac
Peer Host Name Branch
Peer IP Address 198.133.219.2
esp-3des
esp-sha-hmac
CORP
209.165.200.226
DH 2
Encrypted
209.165.200.240/28 198.133.219.32/27
Network
86400
Crypto Map
VPN-MAP
VPN-MAP
Name
Vpnpass101 SA Establishmentipsec-isakmp
ipsec-isakmp
a. Configure an ACL (ACL 120) on the CORP router to identify the interesting traffic. The
interesting traffic is all IP traffic between the two LANs (209.165.200.240/28 and
198.133.219.32/27).
CORP(config)# access-list 120 permit ip 209.165.200.240 0.0.0.15 198.133.219.32 0.0.0.31
b. Configure the ISAKMP Phase 1 properties on the CORP router. The crypto ISAKMP policy is
10. Refer to the ISAKMP Phase 1 Policy Parameters Table for the specific details needed.
CORP(config)# crypto isakmp policy 10
CORP(config-isakmp)# encryption aes 256
CORP(config-isakmp)# authentication pre-share
CORP(config-isakmp)#group 2
CORP(config-isakmp)# lifetime 86400
CORP(config-isakmp)# hash sha
CORP(config-isakmp)# exit
CORP(config)# crypto isakmp key Vpnpass101 address 198.133.219.2
c. Configure the ISAKMP Phase 2 properties on the CORP router. Refer to the ISAKMP Phase 2
Policy Parameters Table for the specific details needed.