SC Journal 6453
SC Journal 6453
SC Journal 6453
AFFILIATED TO
UNIVERSITY OF
MUMBAI
Affiliated to
UNIVERSITY OF MUMBAI
This is to certify that Mr. Gupta Suraj Rammurti Rekha, Roll No. 6453
of TY BSc IT class has completed the required number of Experiment of
Practical Security in computing, in partial fulfillment of the Requirements
for the award of the degree of Bachelor of Science (Information Technology)
during the academic year 2023-2024.
Topology:
Addressing Table
Objectives
• Configure OSPF MD5 authentication.
• Configure NTP.
• Configure routers to log messages to the syslog server.
• Configure R3 to support SSH connections.
Background / Scenario
In this activity, you will configure OSPF MD5 authentication for secure routing updates.
The NTP Server is the master NTP server in this activity. You will configure authentication
on the NTP server and the routers. You will configure the routers to allow the software clock
to be synchronised by NTP to the time server. Also, you will configure the routers to
periodically update the hardware clock with the time learned from NTP.
The Syslog Server will provide message logging in this activity. You will configure the
routers to identify the remote host (Syslog server) that will receive logging messages.
You will need to configure timestamp service for logging on the routers. Displaying the
correct time and date in Syslog messages are vital when using Syslog to monitor a network.
You will configure R3 to be managed securely using SSH instead of Telnet. The servers have
been preconfigured for NTP and Syslog services respectively. NTP will not require
authentication. The routers have been pre-configured with the following passwords:
• Enable password: ciscoenpa55 // password is set to access the EXEC mode of routers
Pre-configured the routers with the following passwords 1st for Enabling, 2nd for
Virtual Terminal, 3rd for Console .
R1:
R2:
R3:
Virtual teletype (VTY) is a command line interface (CLI) that allows users to access a
device's control plane.VTY is a virtual port that provides access to Telnet or SSH.
For example, Cisco hardware supports a maximum of 16 line virtual interfaces, i.e.
(0,1,2,3,…,15).The abstract “0 - 4” means that the device can allow 5 simultaneous virtual
connections which may be Telnet or SSH.
• Password for vty lines: ciscovtypa55 // vty is used for remote access of a device's CLI
R3:
R1:
For Console:
R1:
R2:
R3:
Do the OSPF on all the router put all of them under area 0[1(unique processid), 0(area
id)]
R1:
R2:
R3:
Part 1 :Configure OSPF MD5 Authentication
OSPF MD5 authentication is a type of authentication that uses the MD5 algorithm to
compute a hash value from the contents of an OSPF packet. It also uses the MD5 algorithm
to compute a password.
OSPF MD5 authentication is more secure than simple text authentication. It ensures that
unauthorised IP resources cannot inject OSPF routing messages into the network without
detection. This helps to ensure the integrity of the routing tables in the OSPF routing
network.
Step 3: Configure the MD5 key for all the routers in area 0.
Configure an MD5 key on the serial interfaces on R1, R2 and R3. Use the password
MD5pa55 for key 1.
//(key id)
//ip…..key (command to configure an ospf md5 authentication key)
//md5(type)
Configure R1, R2, and R3 to periodically update the hardware clock with the time learned
from NTP.
//synchronises h/w clock with time obtained from NTP server
Verify that the hardware clock was updated using the command show clock
Configure NTP authentication on R1, R2, and R3 using key 1 and password NTPpa55.
R1(config)# ntp authenticate
R1(config)# ntp trusted-key 1
R1(config)# ntp authentication-key 1 md5 NTPpa55
//enables ntp authentication(exchange of ntp packets between device and ntp server)
//1(authentication key trusted for authenticating NTP packets)
//1(authentication key)//md5(authentication method)
Step 5: Configure routers to timestamp log messages.
Do same for all three routers i.e R1 , R2 , R3
Configure timestamp service for logging on the routers
//ser……log(enable timestamp for log msg)
//datetime-timestamp includes date nd time
//msec(date nd time + milliseconds)
Part 3: Configure Routers to Log Messages to the Syslog Server
Step 1: Configure the routers to identify the remote host (Syslog Server) that will
receive logging messages.
Use the command show logging to verify logging has been enabled.
From the Services tab of the Syslog Server’s dialogue box, select the Syslog services
button. Observe the logging messages received from the routers.
Part 4: Configure R3 to support SSH Connections
SSH stands for Secure Shell, or Secure Socket Shell. It's a cryptographic protocol that allows
two computers to communicate and share data over an insecure network, such as the internet.
It's used to log in to a remote server to execute commands and data transfer from one
machine to another.
The port is used for Secure Shell (SSH) communication and allows remote administration
access to the VM.
Step 1: Configure a domain name
Create a user ID of SSHadmin with the highest possible privilege level and a secret password
of ciscosshpa55.
//15(for admins)
Use the show ip ssh command to see the current settings. Verify that the authentication
timeout and retries are at their default values of 120 and 3.
The default SSH timeouts and authentication parameters can be altered to be more restrictive.
Set the timeout to 90 seconds, the number of authentication retries to 2, and the version to 2.
Step 8: Attempt to connect to R3 via Telnet from PC-C.
Open the Desktop of PC-C. Select the Command Prompt icon. From PC-C, enter the
command to connect to R3 via Telnet.
This connection should fail because R3 has been configured to accept only SSH connections
on the virtual terminal lines.
Open the Desktop of PC-C. Select the Command Prompt icon. From PC-C, enter the
command to connect to R3 via SSH. When prompted for the password, enter the password
configured for the administrator ciscosshpa55.
To troubleshoot and maintain R3, the administrator at the ISP must use SSH to access the
router CLI. From the CLI of R2, enter the command to connect to R3 via SSH version 2
using the SSHadmin user account.
When prompted for the password, enter the password configured for the administrator:
ciscosshpa55.
Topology
Addressing Table
Background / Scenario
The network topology shows routers R1, R2 and R3. Currently, all administrative security is
based on knowledge of the enabled secret password. Your task is to configure and test local
and server-based AAA solutions.
You will create a local user account and configure local AAA on router R1 to test the console
and vty logins.
o User account: Admin1 and password admin1pa55
You will then configure router R2 to support server-based authentication using the TACACS+
protocol. The TACACS+ server has been pre-configured with the following:
o Client: R2 using the keyword tacacspa55
o User account: Admin2 and password admin2pa55
Finally, you will configure router R3 to support server-based authentication using the
RADIUS protocol. The RADIUS server has been pre-configured with the following:
o Client: R3 using the keyword radiuspa55
o User account: Admin3 and password admin3pa55
The routers have also been pre-configured with the following:
o Enable secret password: ciscoenpa55
o OSPF routing protocol with MD5 authentication using password: MD5pa55
Do the OSPF on all the router put all of them under area 0
Part 1: Configure Local AAA Authentication for Console Access on R1
AAA stands for Authentication, Authorization, and Accounting. It's a security framework that
controls and tracks user access to computer networks. AAA is a requirement for network
security.
AAA has three parts:
Authentication: Uses a username and password to identify a user. It grants or denies access
based on a user's account and password.
Authorization: Determines what level of access a user has on the network.
Accounting: Tracks a user's activity while accessing network resources. This includes the
amount of time spent in the network, the services accessed, and the amount of data
transferred. Accounting data is used for trend analysis, capacity planning, and billing
Enable AAA on R1 and configure AAA authentication for the console login to use the local
database.
Step 4: Configure the line console to use the defined AAA authentication method.
Enable AAA on R1 and configure AAA authentication for the console login to use the default
method list.
Step 1: Configure domain name and crypto key for use with SSH.
Step 2: Configure a named list AAA authentication method for the vty lines on R1.
Configure a named list called SSH-LOGIN to authenticate logins using local AAA.
Step 3: Configure the vty lines to use the defined AAA authentication method.
Configure the vty lines to use the named AAA method and only allow SSH for remote
access.
//S…IN(named list used for login attempts)
Step 4: Verify the AAA authentication method.
Verify the SSH configuration SSH to R1 from the command prompt of PC-A..
For backup purposes, configure a local username of Admin2 and a secret password of
admin2pa55.
Click the TACACS+ Server. On the Services tab, click AAA. Notice that there is a Network
configuration entry for R2 and a User Setup entry for Admin2.
Step 3: Configure the TACACS+ server specifics on R2.
Configure the AAA TACACS server IP address and secret key on R2.
Note: The commands tacacs-server host and tacacs-server key are deprecated. Currently,
Packet Tracer does not support the new command tacacs server.
Enable AAA on R2 and configure all logins to authenticate using the AAA TACACS+ server.
If it is not available, then use the local database.
Step 5: Configure the line console to use the defined AAA authentication method.
Configure AAA authentication for console login to use the default AAA authentication
method.
Verify the user EXEC login using the AAA TACACS+ server.
Part 4: Configure Server-Based AAA Authentication Using RADIUS on R3
For backup purposes, configure a local username of Admin3 and a secret password of
admin3pa55.
Click the RADIUS Server. On the Services tab, click AAA. Notice that there is a Network
configuration entry for R3 and a User Setup entry for Admin3.
Configure the AAA RADIUS server IP address and secret key on R3.
Note: The commands radius-server host and radius-server key are deprecated. Currently
Packet Tracer does not support the new command radius server.
Enable AAA on R3 and configure all logins to authenticate using the AAA RADIUS server.
If it is not available, then use the local database.
Step 5: Configure the line console to use the defined AAA authentication method.
Configure AAA authentication for console login to use the default AAA authentication
method.
Verify the user EXEC login using the AAA RADIUS server.
Practical 3
Configuring Extended ACLs - Scenario 1
Topology
Addressing Table
Device Interface IP Address Subnet Mask Default
Gateway
Background / Scenario
Two employees need access to services provided by the server. PC1 needs only FTP access
while PC2
needs only web access. Both computers are able to ping the server, but not each other.
a. From global configuration mode on R1, enter the following command to determine
the first valid number for an extended access list.
d. This ACL permits FTP and ICMP. ICMP is listed above, but FTP is not, because
FTP uses TCP. Therefore,enter tcp to further refine the ACL help.
e. Notice that we could filter just for PC1 by using the host keyword or we could allow
any host. In this case, any device is allowed that has an address belonging to the
172.22.34.64/27 network.
f. Calculate the wildcard mask determining the binary opposite of a subnet mask.
11111111.11111111.11111111.11100000 = 255.255.255.224
00000000.00000000.00000000.00011111 = 0.0.0.31
i. Notice that one of the options is <cr> (carriage return). In other words, you can press
Enter and the statement would permit all TCP traffic. However, we are only permitting
FTP traffic; therefore, enter the eq keyword, followed by a question mark to display the
available options. Then, enter ftp and press Enter.
where,
access-list 100 specifies the extended ACL with numeric identifier.
permit allow.
tcp IP protocol to match. (commonly used for FTP)
172.22.34.66, the source IP address.
0.0.0.31 is the wildcard mask.
host is the keyword followed by the server’s IP address(destination) i.e, 172.22.34.62.
eq ftp specifies traffic equal to FTP having port number 21.
Then press Enter.
j. Create a second access list statement to permit ICMP (ping, etc.) traffic from PC1 to
Server. Note that the access list number remains the same and no particular type of
ICMP traffic needs to be specified.
a. Ping from PC1 to Server. If the pings are unsuccessful, verify the IP addresses before
continuing.
b. FTP from PC1 to Server. The username and password are both cisco.
pc> ftp 172.22.34.62
d. Ping from PC1 to PC2. The destination host should be unreachable, because the
traffic was not explicitly permitted.
Part 2: Configure, Apply and Verify an Extended Named ACL
a. Named ACLs start with the ip keyword. From the global configuration mode of R1,
enter the following command, followed by a question mark.
b. You can configure named standard and extended ACLs. This access list filters both
source and destination IP addresses; therefore, it must be extended. Enter
HTTP_ONLY as the name. (For Packet Tracer scoring, the name is case-sensitive.)
c. The prompt changes. You are now in extended named ACL configuration mode. All
devices on the PC2 LAN need TCP access. Enter the network.
e. Finish the statement by specifying the server address as you did in Part 1 and filtering
www traffic.
f. Create a second access list statement to permit ICMP (ping, etc.) traffic from PC2 to
Server. Note: The prompt remains the same and a specific type of ICMP traffic does not
need to be specified.
where,
ip acces-list extended signals that subsequent lines of configuration will define rules and
criteria.
Enter HTTP_ONLY as the name.
permit tcp because all devices on the PC2 LAN need TCP access. Enter the source address,
i.e,172.22.34.98 followed by a wildcard mask 0.0.0.15.
172.22.34.62 is the server address as you did in Part 1 and filtering www traffic with port
number 80.
From R1’s perspective, the traffic that access list HTTP_ONLY applies to is inbound
from the network
connected to Gigabit Ethernet 0/1 interface. Enter the interface configuration mode and
apply the ACL.
Topology :
Addressing Table :
Device Interface IP Address Subnet Mask Default Gateway
From R1’s perspective, the traffic that access list HTTP_ONLY applies to
is inbound from the network connected to Serial0/0/1 interface. Enter
the interface configuration mode and apply the ACL.
R2(config)#interface Serial0/0/1
R2(config-if)#ip access-group 100 out
R2(config-if)#exit
Topology:
Addressing Table:
Device Interface IP Address Subnet Mask Default Switch
Gateway Port
Objectives
• Verify connectivity among devices before firewall configuration.
• Use ACLs to ensure remote access to the routers is available only from management station
PC-C.
• Configure ACLs on R1 and R3 to mitigate attacks.
• Verify ACL functionality.
Background/Scenario
Access to routers R1, R2, and R3 should only be permitted from PC-C, the management
station. PC-C is also used for connectivity testing to PC-A, which is a server providing DNS,
SMTP, FTP, and HTTPS services.
Standard operating procedure is to apply ACLs on edge routers to mitigate common threats
based on source and destination IP address. In this activity, you will create ACLs on edge
routers R1 and R3 to achieve this goal. You will then verify ACL functionality from internal
and external hosts.
Static Routing
R1
R1
R2
R3
c. Open a web browser to the PC-A server (192.168.1.3) to display the web page. Close
the browser when done.
Part 2: Secure Access to Routers
Step 1: Configure ACL 10 to block all remote access to the routers except from PC-C.
Use the access-list command to create a numbered IP ACL on R1, R2, and R3.
Step 2: Apply ACL 10 to ingress traffic on the VTY lines. Use the access-class
command to apply the access list to incoming traffic on the VTY lines.
Password : ciscosshpa55
Note: Check Results will not show a correct configuration for ACL 120 until you modify it
in Part 4.
Step 1: Verify that PC-C can access the PC-A via HTTPS using the web browser.
Be sure to disable HTTP and enable HTTPS on server PC-A.
Step 2: Configure ACL 120 to specifically permit and deny the specified traffic. Use the
access-list command to create a numbered IP ACL.
Step 3: Apply the ACL to interface S0/0/0. Use the ip access-group command to apply
the access list to incoming traffic on interface S0/0/0.
Step 4: Verify that PC-C cannot access PC-A via HTTPS using the web browser.
Step 1: Verify that PC-A cannot successfully ping the loopback interface on R2.
Step 2: Make any necessary changes to ACL 120 to permit and deny the specified
traffic. Use the access-list command to create a numbered IP ACL.
Step 3: Verify that PC-A can successfully ping the loopback interface on R2.
Deny all outbound packets with source address outside the range of internal IP addresses on
R3.
Step 1: Configure ACL 110 to permit only traffic from the inside network. Use the
access-list command to create a numbered IP ACL.
Step 2: Apply the ACL to interface G0/1. Use the ip access-group command to apply the
access list to incoming traffic on interface G0/1.
On R3, block all packets containing the source IP address from the following pool of
addresses: any RFC 1918 private addresses, 127.0.0.0/8, and any IP multicast address. Since
PC-C is being used for remote administration, permit SSH traffic from the 10.0.0.0/8 network
to return to the host PC-C.
Step 1: Configure ACL 100 to block all specified traffic from the outside network.
You should also block traffic sourced from your own internal address space if it is not an
RFC 1918 address.
In this activity, your internal address space is part of the private address space specified in
RFC 1918. Use the access-list command to create a numbered IP ACL.
Step 2: Apply the ACL to interface Serial 0/0/1. Use the ip access-group command to
apply the access list to incoming traffic on interface Serial 0/0/1.
Step 3: Confirm that the specified traffic entering interface Serial 0/0/1 is handled
correctly.
a. From the PC-C command prompt, ping the PC-A server. The ICMP echo replies are
blocked by the ACL since they are sourced from the 192.168.0.0/16 address space.
Topology
Addressing table:
R1
R2
R3
Assigning IP to PC0 and PC1 and Server
Ping output:
Set router Id:
R1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#hostname R1
R1(config)#ipv6 unicast-routing
R1(config)#ipv6 router eigrp 1
R1(config-rtr)#no shutdown
R1(config-rtr)#eigrp router-id 1.1.1.1
R1(config-rtr)#end
R2>en
R2#conf t
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)#ipv6 unicast-routing
R2(config)#ipv6 router eigrp 1
R2(config-rtr)#no shutdown
R2(config-rtr)#eigrp router-id 2.2.2.2
R3>en
R3#conf t
Enter configuration commands, one per line. End with CNTL/Z.
R3(config)#ipv6 unicast-routing
R3(config)#ipv6 router eigrp 1
R3(config-rtr)#no shutdown
R3(config-rtr)#eigrp router-id 3.3.3.3
Inform it to all the interface:
R1
R1>en
R1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#interface GigabitEthernet0/0
R1(config-if)#ipv6 eigrp 1
R1(config-if)#ex
R1(config)#interface GigabitEthernet0/1
R1(config-if)#ipv6 eigrp 1
R1(config-if)#ex
R1(config)#interface Serial0/0/0
R1(config-if)#ipv6 eigrp 1
R1(config-if)#ex
R2
R3
Step 1: Configure an ACL that will block HTTP and HTTPS access.
Configure an ACL named BLOCK_HTTP on R1 with the following statements.
Set named ACL for blocking from PC1 and PC2 to server ICMP Packet (Ping
Command):
Topology
IP Addressing :
Objectives
• Verify connectivity among devices before firewall configuration.
• Configure a zone-based policy (ZPF) firewall on R3.
• Verify ZPF firewall functionality using ping, SSH, and a web browser.
Background/Scenario
ZPFs are the latest development in the evolution of Cisco firewall technologies. In this
activity, you will configure a basic ZPF on an edge router R3 that allows internal hosts access
to external resources and blocks external hosts from accessing internal resources. You will
then verify firewall functionality from internal and external hosts.
a. From the PC-C command prompt, SSH to the S0/0/1 interface on R2 at 10.2.2.2. Use
the username Admin and password Adminpa55 to log in. PC> ssh -l Admin 10.2.2.2
b. Exit the SSH session.
Step 3: From PC-C, open a web browser to the PC-A server.
a. Click the Desktop tab and then click the Web Browser application. Enter the PC-A IP
address 192.168.1.3 as the URL. The Packet Tracer welcome page from the web server
should be displayed.
b. Close the browser on PC-C.
Note: For all configuration tasks, be sure to use the exact names as specified.
b. If the Security Technology package has not been enabled, use the following command
to enable the package.
Step 2: Create an internal zone. Use the zone security command to create a zone named
IN-ZONE.
R3(config)# zone security IN-ZONE
R3(config-sec-zone) exit
Use the access-list command to create extended ACL 101 to permit all IP protocols from the
192.168.3.0/24 source network to any destination.
Use the class-map type inspect command with the match-all option
Step 1: Create a policy map to determine what to do with matched traffic. Use the
policy-map type inspect command and create a policy map named IN-2-OUT-PMAP.
Step 2: Specify a class type of inspect and reference class map IN-NET-CLASS-MAP.
R3(config-pmap-c)# inspect
%No specific protocol configured in class IN-NET-CLASS-MAP for inspection. All
protocols will be inspected. Issue the exit command twice to leave config-pmap-c mode and
return to config mode.
R3(config-pmap-c)# exit
R3(config-pmap)# exit
Using the zone-pair security command, create a zone pair named IN-2-OUT-ZPAIR. Specify
the source and destination zones that were created in Task 1.
R3(config)#
zone-pair security IN-2-OUT-ZPAIR source IN-ZONE destination OUT-ZONE
Step 2: Specify the policy map for handling the traffic between the two zones.
Attach a policy-map and its associated actions to the zone pair using the service-policy type
inspect command and reference the policy map previously created, IN-2-OUT-PMAP.
Use the zone-member security command in interface configuration mode to assign G0/1
to IN-ZONE and S0/0/1 to OUT-ZONE.
Verify that internal hosts can still access external resources after configuring the ZPF.
From the PC-C command prompt, ping PC-A at 192.168.1.3. The ping should succeed.
Step 2: From internal PC-C, SSH to the R2 S0/0/1 interface.
a. From the PC-C command prompt, SSH to R2 at 10.2.2.2. Use the username Admin
and the password Adminpa55 to access R2. The SSH session should succeed.
Step 4: From internal PC-C, open a web browser to the PC-A server web page.
Enter the server IP address 192.168.1.3 in the browser URL field, and click Go. The
HTTP session should succeed. While the HTTP session is active, issue the command
show policy-map type inspect zone-pair sessions on R3 to view established sessions.
Note: If the HTTP session times out before you execute the command on R3, you will
have to click the Go button on PC-C to generate a session between PC-C and PC-A.
Verify that external hosts CANNOT access internal resources after configuring the ZPF.
From the PC-A command prompt, ping PC-C at 192.168.3.3. The ping should fail.
Topology
Addressing Table:
Objectives
• Enable IOS IPS.
• Configure logging.
• Modify an IPS signature.
• Verify IPS.
Background / Scenario
Your task is to enable IPS on R1 to scan traffic entering the 192.168.1.0 network.
The server labeled Syslog is used to log IPS messages. You must configure the router to
identify the syslog server to receive logging messages. Displaying the correct time and date
in syslog messages is vital when using syslog to monitor the network. Set the clock and
configure the timestamp service for logging on the routers. Finally, enable IPS to produce an
alert and drop ICMP echo reply packets inline.
The server and PCs have been preconfigured. The routers have also been preconfigured with
the following:
a. On R1, issue the show version command to view the Technology Package licence
information.
b. If the Security Technology package has not been enabled, use the following command
to enable the package.
e. Verify that the Security Technology package has been enabled by using the show
version command.
Step 2: Verify network connectivity.
On R1, create a directory in flash using the mkdir command. Name the directory ipsdir.
On R1, configure the IPS signature storage location to be the directory you just created.
IOS IPS supports the use of syslog to send event notification. Syslog notification is enabled
by default. If logging console is enabled, IPS syslog messages display. a. Enable syslog if it is
not enabled.
b. If necessary, use the clock set command from privileged EXEC mode to reset the
clock.
c. Verify that the timestamp service for logging is enabled on the router using the show
run Command.
Retire the all signature category with the retired true command (all signatures within the
signature release).
Unretire the IOS_IPS Basic category with the retired false command.
Apply the IPS rule to an interface with the ip ips name direction command in interface
configuration mode.
Apply the rule outbound on the G0/1 interface of R1. After you enable IPS, some log
messages will be sent to the console line indicating that the IPS engines are being initialized.
Note: The direction in means that IPS inspects only traffic going into the interface. Similarly,
out means that IPS inspects only traffic going out of the interface.
Part 2: Modify the Signature
Un-retire the echo request signature (signature 2004, subsig ID 0), enable it, and change the
signature action to alert and drop.
Use the show ip ips all command to view the IPS configuration status summary.
To which interfaces and in which direction is the iosips rule applied?
Step 3: Verify that IPS is working properly.
a. From PC-C, attempt to ping PC-A. Were the pings successful? Explain.
The pings should fail. This is because the IPS rule for event-action of an echo request was set
to “deny-packet-inline”.
b. From PC-A, attempt to ping PC-C. Were the pings successful? Explain.
The ping should be successful. This is because the IPS rule does not cover echo reply. When
PC-A pings PC-C, PC-C responds with an echo reply.
Step 4: View the syslog messages.
Topology
Objectives
• Assign the Central switch as the root bridge.
• Secure spanning-tree parameters to prevent STP manipulation attacks.
• Enable port security to prevent CAM table overflow attacks.
Background / Scenario
There have been a number of attacks on the network recently. For this reason, the
network administrator has assigned you the task of configuring Layer 2 security.
For optimum performance and security, the administrator would like to ensure that
the root bridge is the 3560 Central switch. To prevent spanning-tree manipulation
attacks, the administrator wants to ensure that the STP parameters are secure. To
prevent against CAM table overflow attacks, the network administrator has decided
to configure port security to limit the number of MAC addresses each switch port can
learn. If the number of MAC addresses exceeds the set limit, the administrator would
like the port to be shutdown. All switch devices have been preconfigured with the
following:
BPDU guard is a feature that can help prevent rogue switches and spoofing on
access ports. Enable BPDU guard on SW-A and SW-B access ports.
Note: Spanning-tree BPDU guard can be enabled on each individual port using the
spanning-tree bpduguard enable command in interface configuration mode or the
spanning-tree portfast bpduguard default command in global configuration mode. For
grading purposes in this activity, please use the spanning-tree bpduguard enable
command.
Root guard can be enabled on all ports on a switch that are not root ports. It is best
deployed on ports that connect to other non-root switches. Use the show
spanning-tree command to determine the location of the root port on each switch. On
SW-1, enable root guard on ports F0/23 and F0/24. On SW-2, enable root guard on
ports F0/23 and F0/24.
Step 1: Configure basic port security on all ports connected to host devices.
This procedure should be performed on all access ports on SW-A and SW-B. Set the
maximum number of learned MAC addresses to 2, allow the MAC address to be
learned dynamically, and set the violation to shutdown. Note: A switch port must be
configured as an access port to enable port security.
a. On SW-A, issue the command show port-security interface f0/1 to verify that
port security has been configured.
b. Ping from C1 to C2 and issue the command show port-security interface f0/1
again to verify that the switch has learned the MAC address for C1.
Step 3: Disable unused ports.
Addressing Table:
Objectives
Background / Scenario
The network topology shows three routers. Your task is to configure R1 and R3 to
support a site-to-site IPsec VPN when traffic flows between their respective LANs.
The IPsec VPN tunnel is from R1 to R3 via R2. R2 acts as a pass-through and has
no knowledge of the VPN. IPsec provides secure transmission of sensitive
information over unprotected networks, such as the Internet. IPsec operates at the
network layer and protects and authenticates IP packets between participating IPsec
devices (peers), such as Cisco routers.
R2
R3
R2
R3
R3
OSPF:
R1
R2
R3
a. On R1, issue the show version command to view the Security Technology
package license information.
b. If the Security Technology package has not been enabled, use the following
command to enable the package.
d. Save the running-config and reload the router to enable the security license.
e. Verify that the Security Technology package has been enabled by using the
show version command.
Step 3: Identify interesting traffic on R1.
Configure ACL 110 to identify the traffic from the LAN on R1 to the LAN on R3 as
interesting. This interesting traffic will trigger the IPsec VPN to be implemented when
there is traffic between the R1 to R3 LANs. All other traffic sourced from the LANs
will not be encrypted. Because of the implicit deny all, there is no need to configure a
deny ip any any statement.
Configure the crypto ISAKMP policy 10 properties on R1 along with the shared
crypto key vpnpa55. Refer to the ISAKMP Phase 1 table for the specific parameters
to configure. Default values do not have to be configured. Therefore, only the
encryption method, key exchange method, and DH method must be Configured.
b. Create the crypto map VPN-MAP that binds all of the Phase 2 parameters
together. Use sequence number 10 and identify it as an ipsec-isakmp map.
a. On R3, issue the show version command to verify that the Security
Technology package license information has been enabled.
b. If the Security Technology package has not been enabled, enable the
package and reload R3.
Step 3: Configure the IKE Phase 1 ISAKMP properties on R3. Configure the
crypto ISAKMP policy 10 properties on R3 along with the shared crypto key
vpnpa55.
b. Create the crypto map VPN-MAP that binds all of the Phase 2 parameters
together. Use sequence number 10 and identify it as an ipsec-isakmp map.
Step 5: Configure the crypto map on the outgoing interface. Bind the VPN-MAP
crypto
map to the outgoing Serial 0/0/1 interface. Note: This is not graded.
Part 3: Verify the IPsec VPN
On R1, re-issue the show crypto ipsec sa command. Notice that the number of
packets is more than 0, which indicates that the IPsec VPN tunnel is working.
Step 4: Create uninteresting traffic.
On R1, re-issue the show crypto ipsec sa command. Notice that the number of
packets has not changed, which verifies that uninteresting traffic is not encrypted.