Professional Documents
Culture Documents
Network Diagram:
Diagram uses slightly different naming convention (Hostnames and vlan names) , same
topology)
A few things to keep in mind while completing this activity:
1. Do not use the browser Back button or close or reload any exam windows during the exam.
2. Do not close Packet Tracer when you are done. It will close automatically.
3. Click the Submit Assessment button in the browser window to submit your work.
Introduction
In Part I of this practice skills assessment, you will configure the Company A network with
routing and ACLs. You will configure dynamic routing with OSPFv2 and distribute a default
route. In addition, you will configure two access control lists.
In Part II of this practice skills assessment, you will configure the Company A network with
RPVST+, port security, EtherChannel, DHCP, VLANs and trunking, and routing between
VLANs. In addition you will perform an initial configuration on a switch, secure switch ports
and create SVIs. You will also control access to the switch management network with an access
control list.
All IOS device configurations should be completed from a direct terminal connection to the
device console from an available host.
Some values that are required to complete the configurations have not been given to you. In
those cases, create the values that you need to complete the requirements. These values may
include certain IP addresses, passwords, interface descriptions, banner text, and other values.
When you have been given a text value, such as a password, user name, DHCP pool name, ACL
name, VLAN name, etc, you must enter these values exactly as they are given in these
instructions. If the values do not match exactly, you may not receive credit for your
configuration.
For the sake of time, many repetitive but important configuration tasks have been omitted from
this activity. Many of these tasks, especially those related to device security, are essential
elements of a network configuration. The intent of this activity is not to diminish the importance
of full device configurations.
Addressing table:
VLAN Switch Port Assignment Table:
Port-Channel Groups:
Instructions:
All configurations must be performed through a direct terminal connection to the device
console line from an available host.
Task:
Determine the IP addresses that you will use for the required interfaces on the devices and LAN
hosts. Follow the configuration details provided in the Addressing Table.
How:
This part requires and understanding of the addressing constants that make up a normal network
separated by subnets. Lets take a look at the first entry we are asked to find. We are asked to
pick any address in the network 192.168.100.20/30.
A Typical network range has two addresses that are not suitable as host addresses, these are the
First and the Last addresses are corespond to the Subnet ID and Broadcast address. So with our
network we know that 192.168.100.20 will be the Subnet ID so our First usable host address will
be 192.168.100.21/30
The next issue we run into is working out how many host addresses are available in the subnet.
To explain this process Im going to draw out 32bits representing the 4 octets of 8bits that make
up an IPv4 address.
BIT ADDRESS
00 192.168.100.20 Subnet ID
01 192.168.100.21 Host
10 192.168.100.22 Host
11 192.168.100.23 Broadcast Address
Addressing table Complete
Task:
Configure Site 1 with initial settings:
Configure the router host name: Bldg-1. This value must be entered exactly as it appears here.
Prevent the router from attempting to resolve command line entries to IP addresses.
Protect device configurations from unauthorized access with an encrypted secret password.
Secure the router console and remote access lines.
Prevent system status messages from interrupting console output.
Configure a message-of-the-day banner.
Encrypt all clear text passwords.
How:
Configure the router host name: Bldg-1. This value must be entered exactly as it appears here.
Router(config)#hostname Bldg-1
Prevent the router from attempting to resolve command line entries to IP addresses.
Bldg-1(config)#no ip domain lookup
Protect device configurations from unauthorized access with an encrypted secret password.
Bldg-1(config)#line console 0
Bldg-1(config-line)#password cisco
Bldg-1(config-line)#login
Bldg-1(config-line)#line vty 0 4
Bldg-1(config-line)#password cisco
Bldg-1(config-line)#login
Bldg-1(config-line)#line aux 0
Bldg-1(config-line)#password cisco
Bldg-1(config-line)#login
Bldg-1(config)#line console 0
Bldg-1(config-line)#logging synchronous
Bldg-1(config)#service password-encryption
Task:
Configure the interfaces of all routers for full connectivity with the following:
IP addressing
Descriptions for the three connected interfaces of HQ.
Configure DCE settings where required. Use a rate of 128000.
The Ethernet subinterfaces on Site 2 will configured later in this assessment.
How:
IP addressing
Bldg-1(config)#int s0/0/0
Bldg-1(config-if)#ip address 192.168.100.22 255.255.255.252
Bldg-1(config-if)#no shutdown
Bldg-1(config)#int g0/0
Bldg-1(config-if)#ip address 192.168.8.1 255.255.255.0
Bldg-1(config-if)#no shutdown
Bldg-1(config)#int g0/1
Bldg-1(config-if)#ip address 192.168.9.1 255.255.255.0
Bldg-1(config-if)#no shutdown
Main(config)#int s0/0/0
Main(config-if)#ip address 192.168.100.21 255.255.255.252
Main(config-if)#no shutdown
Main(config)#int s0/0/1
Main(config-if)#ip address 192.168.100.37 255.255.255.252
Main(config-if)#no shutdown
Main(config)#int s0/1/0
Main(config-if)#ip address 203.0.113.18 255.255.255.248
Main(config-if)#no shutdown
Bldg-2(config)#int s0/0/1
Bldg-2(config-if)#ip address 192.168.100.38 255.255.255.252
Bldg-2(config-if)#no shutdown
Bldg-2(config)#int g0/1
Bldg-2(config-if)#no shutdown
Main(config)#int s0/0/0
Main(config-if)#description 2-Building1
Main(config)#int s0/0/1
Main(config-if)#description 2-Building2
Main(config)#int s0/1/0
Main(config-if)#description 2-INTERNET
Bldg-1(config)#int s0/0/0
Bldg-1(config-if)#clock rate 128000
Main(config)#int s0/0/1
Main(config-if)#clock rate 128000
Task:
Configure router Site 2 to route between VLANs using information in the Addressing Table and
VLAN Switch Port Assignment Table. The VLANs will be configured on the switches later in
this assessment.
Do not route the VLAN 99 network.
How:
Bldg-2(config)#int g0/1.2
Bldg-2(config-subif)#encapsulation dot1Q 2
Bldg-2(config-subif)#ip address 10.10.2.1 255.255.255.0
Bldg-2(config-subif)#int g0/1.4
Bldg-2(config-subif)#encapsulation dot1Q 4
Bldg-2(config-subif)#ip address 10.10.4.1 255.255.255.0
Bldg-2(config-subif)#int g0/1.8
Bldg-2(config-subif)#encapsulation dot1Q 8
Bldg-2(config-subif)#ip address 10.10.8.1 255.255.255.0
Bldg-2(config-subif)#int g0/1.15
Bldg-2(config-subif)#encapsulation dot1Q 15
Bldg-2(config-subif)#ip address 10.10.15.1 255.255.255.0
Bldg-2(config-subif)#int g0/1.25
Bldg-2(config-subif)#encapsulation dot1Q 25
Bldg-2(config-subif)#ip address 10.10.25.1 255.255.255.0
Task:
On Main, configure a default route to the Internet. Use the exit interface argument.
How:
a. On all routers:
Task:
Configure multiarea OSPFv2 to route between all internal networks. Use a process ID of 1.
Use the area numbers shown in the topology.
Use the correct wild card masks for all network statements.
You are not required to route the SVI-NET VLAN network on Site 2.
How:
Configure multiarea OSPFv2 to route between all internal networks. Use a process ID of 1.
Use the area numbers shown in the topology.
Use the correct wild card masks for all network statements.
You are not required to route the SVI-NET VLAN network on Site 2.
Calculating the wildcard for each OSPF route is done by looking again at the subnet mask bit.
lets use the 192.168.100.20/30 network. The following shows what a wild card mask for 0.0.0.0
or /32 would look like
Bldg-1(config)#router ospf 1
Bldg-1(config-router)#network 192.168.100.20 0.0.0.3 area 0
Bldg-1(config-router)#network 192.168.8.0 0.0.0.255 area 1
Bldg-1(config-router)#network 192.168.9.0 0.0.0.255 area 1
Main(config)#router ospf 1
Main(config-router)#network 192.168.100.20 0.0.0.3 area 0
Main(config-router)#network 192.168.100.36 0.0.0.3 area 0
Bldg-2(config)#router ospf 1
Bldg-2(config-router)#network 192.168.100.36 0.0.0.3 area 0
Bldg-2(config-router)#network 10.10.2.0 0.0.0.255 area 2
Bldg-2(config-router)#network 10.10.4.0 0.0.0.255 area 2
Bldg-2(config-router)#network 10.10.8.0 0.0.0.255 area 2
Bldg-2(config-router)#network 10.10.15.0 0.0.0.255 area 2
Bldg-1(config)#router ospf 1
Bldg-1(config-router)#passive-interface GigabitEthernet0/0
Bldg-1(config-router)#passive-interface GigabitEthernet0/1
Main(config)#router ospf 1
Main(config-router)#passive-interface Serial0/1/0
Bldg-2(config)#router ospf 1
Bldg-2(config-router)#passive-interface GigabitEthernet0/1
Bldg-2(config-router)#passive-interface g0/1.2
Bldg-2(config-router)#passive-interface g0/1.4
Bldg-2(config-router)#passive-interface g0/1.8
Bldg-2(config-router)#passive-interface g0/1.15
b. On the HQ router:
Task:
Configure multiarea OSPFv2 to distribute the default route to the other routers.
How:
Main(config)#router ospf 1
Main(config-router)#default-information originate
Bldg-1(config)#int s0/0/0
Bldg-1(config-if)#bandwidth 128
Main(config)#int s0/0/0
Main(config-if)#bandwidth 128
Main(config)#int s0/0/1
Main(config-if)#bandwidth 128
Bldg-2(config)#int s0/0/1
Bldg-2(config-if)#bandwidth 128
Bldg-1(config)#router ospf 1
Bldg-1(config-router)#router-id 1.1.1.1
HQ: 2.2.2.2
Main(config)#router ospf 1
Main(config-router)#router-id 2.2.2.2
Site 2: 3.3.3.3
Bldg-2(config)#router ospf 1
Bldg-2(config-router)#router-id 3.3.3.3
Bldg-1(config)#int s0/0/0
Bldg-1(config-if)#ip ospf cost 7500
Main(config)#int s0/0/0
Main(config-if)#ip ospf cost 7500
Bldg-1(config)#int s0/0/0
Bldg-1(config-if)#ip ospf message-digest-key 1 md5 xyz_OSPF
Bldg-1(config-if)#ip ospf authentication message-digest
Main(config)#int s0/1/0
Main(config-if)#ip ospf message-digest-key 1 md5 xyz_OSPF
Main(config-if)#ip ospf authentication message-digest
Main(config)#int s0/0/1
Main(config-if)#ip ospf message-digest-key 1 md5 xyz_OSPF
Main(config-if)#ip ospf authentication message-digest
Bldg-2(config)#int s0/0/1
Bldg-2(config-if)#ip ospf message-digest-key 1 md5 xyz_OSPF
Bldg-2(config-if)#ip ospf authentication message-digest
Task/How:
You will configure two access control lists in this step. You should use the any and host
keywords in the ACL statements as required. The ACL specifications are as follows:
Allow only Admin Host to ping addresses within the Company A network. Only echo messages
should be permitted.
Prevent all other Internet hosts (not only the Internet hosts visible in the topology) from pinging
addresses inside the Company A network. Block echo messages only.
All other traffic should be allowed.
Your ACL should consist of three statements.
Your ACL should be placed in the most efficient location as possible to conserve network
bandwidth and device processing resources.
c. Control access to the management interfaces (SVI) of the three switches attached to Site 2 as
follows:
Create a standard ACL.
Use the number 1 for the list.
Permit only addresses from the admin VLAN network to access any address on the SVI-NET
VLAN network. (VLAN25)
Bldg-2(config)#interface gi0/1.25
Bldg-2(config-if)#ip access-group 1 out
Hosts on the admin VLAN network should be able to reach all other destinations.
Your list should consist of one statement.
Your ACL should be placed in the most efficient location as possible to conserve network
bandwidth and device processing resources.
You will be able to test this ACL at the end of Part II of this assessment.
Task/How:
On all three switches that are attached to Site 2, create and name the VLANs shown in the
VLAN Table.
The VLAN names that you configure must match the values in the table exactly.
Each switch should be configured with all of the VLANs shown in the table.
FL-A(config)#vlan 2
FL-A(config-vlan)#name dept1
FL-A(config)#vlan 4
FL-A(config-vlan)#name dept2
FL-A(config)#vlan 8
FL-A(config-vlan)#name dept3
FL-A(config)#vlan 15
FL-A(config-vlan)#name NetAdmin
FL-A(config)#vlan 25
FL-A(config-vlan)#name manage
FL-A(config)#vlan 99
FL-A(config-vlan)#name safe
FL-B(config)#vlan 2
FL-B(config-vlan)#name dept1
FL-B(config)#vlan 4
FL-B(config-vlan)#name dept2
FL-B(config)#vlan 8
FL-B(config-vlan)#name dept3
FL-B(config)#vlan 15
FL-B(config-vlan)#name NetAdmin
FL-B(config)#vlan 25
FL-B(config-vlan)#name manage
FL-B(config)#vlan 99
FL-B(config-vlan)#name safe
FL-C(config)#vlan 2
FL-C(config-vlan)#name dept1
FL-C(config)#vlan 4
FL-C(config-vlan)#name dept2
FL-C(config)#vlan 8
FL-C(config-vlan)#name dept3
FL-C(config)#vlan 15
FL-C(config-vlan)#name NetAdmin
FL-C(config)#vlan 25
FL-C(config-vlan)#name manage
FL-C(config)#vlan 99
FL-C(config-vlan)#name safe
Task/How:
Using the VLAN table, assign switch ports to the VLANs you created in Step 1, as follows:
All switch ports that you assign to VLANsn should be configured to static access mode.
All switch ports that you assign to VLANs should be activated.
FL-A(config)#interface fa0/5
FL-A(config-if)#switchport mode access
FL-A(config-if)#switchport access vlan 2
FL-A(config-if)#no shutdown
FL-A(config)#interface fa0/10
FL-A(config-if)#switchport mode access
FL-A(config-if)#switchport access vlan 4
FL-A(config-if)#no shutdown
FL-A(config)#interface fa0/15
FL-A(config-if)#switchport mode access
FL-A(config-if)#switchport access vlan 8
FL-A(config-if)#no shutdown
FL-A(config)#interface fa0/24
FL-A(config-if)#switchport mode access
FL-A(config-if)#switchport access vlan 15
FL-A(config-if)#no shutdown
FL-C(config)#interface fa0/7
FL-C(config-if)#switchport mode access
FL-C(config-if)#switchport access vlan 2
FL-C(config-if)#no shutdown
FL-C(config)#interface fa0/10
FL-C(config-if)#switchport mode access
FL-C(config-if)#switchport access vlan 4
FL-C(config-if)#no shutdown
FL-C(config)#interface fa0/15
FL-C(config-if)#switchport mode access
FL-C(config-if)#switchport access vlan 8
FL-C(config-if)#no shutdown
FL-C(config)#interface fa0/24
FL-C(config-if)#switchport mode access
FL-C(config-if)#switchport access vlan 15
FL-C(config-if)#no shutdown
Note that all of the unused ports on FL-A should be assigned to VLAN 99. This configuration
step on switches FL-B and FL-C is not required in this assessment for the sake of time.
Secure the unused switch ports on FL-A by shutting them down.
Task/How:
Refer to the Addressing Table. Create and address the SVIs on all three of the switches that are
attached to Site 2. Configure the switches so that they can communicate with hosts on other
networks. Full connectivity will be established after routing between VLANs has been
configured later in this assessment.
Task/How:
a. Use the information in the Port-Channel Groups table to configure EtherChannel as follows:
Use LACP.
The switch ports on both sides of Channels 1 and 2 should initiate negotiations for channel
establishment.
FL-A(config)#interface port-channel 1
FL-A(config-if)#switchport mode trunk
FL-A(config)#interface port-channel 2
FL-A(config-if)#switchport mode trunk
FL-B(config)#interface port-channel 2
FL-B(config-if)#switchport mode trunk
FL-C(config)#interface port-channel 1
FL-C(config-if)#switchport mode trunk
The switch ports on the FL-B side of Channel 3 should initiate negotiations with the switch
ports on FL-C.
FL-B(config)#interface port-channel 3
FL-B(config-if)#switchport mode trunk
The switch ports on the FL-C side of Channel 3 should not initiate negotiations with the switch
ports on the other side of the channel.
FL-C(config)#interface range fa0/5-6
FL-C(config-if-range)#channel-group 3 mode passive
FL-B(config-if-range)#no shutdown
FL-C(config)#interface port-channel 3
FL-C(config-if)#switchport mode trunk
All channels should be ready to forward data after they have been configured.
c. Configure static trunking on the switch port on FL-B that is connected to Site 2.
FL-B(config)#interface g0/1
FL-B(config-if)#switchport mode trunk
Task/How:
Configure Rapid PVST+ as follows:
FL-A should be configured as root primary for VLAN 2 and VLAN 4 using the default primary
priority values.
FL-A should be configured as root secondary for VLAN 8 and VLAN 15 using the default
secondary priority values.
FL-C should be configured as root primary for VLAN 8 and VLAN 15 using the default
primary priority values.
b. Activate PortFast and BPDU Guard on the active FL-C switch access ports.
On FL-C, configure PortFast on the access ports that are connected to hosts.
On FL-C, activate BPDU Guard on the access ports that are connected to hosts.
Task/How:
You are required to complete the following only on some of the devices in the network for this
assessment. In reality, security should be configured on all devices in the network.
a. Configure port security on all active access ports that have hosts connected on FL-A.
FL-A(config)#interface fa0/5
FL-A(config-if)#switchport port-security
FL-A(config)#interface fa0/10
FL-A(config-if)#switchport port-security
FL-A(config)#interface fa0/15
FL-A(config-if)#switchport port-security
FL-A(config)#interface fa0/24
FL-A(config-if)#switchport port-security
Each active access port should accept only two MAC addresses before a security action occurs.
FL-A(config)#interface fa0/5
FL-A(config-if)#switchport port-security maximum 2
FL-A(config)#interface fa0/10
FL-A(config-if)#switchport port-security maximum 2
FL-A(config)#interface fa0/15
FL-A(config-if)#switchport port-security maximum 2
FL-A(config)#interface fa0/24
FL-A(config-if)#switchport port-security maximum 2
If a security violation occurs, the switch ports should provide notification that a violation has
occurred but not place the interface in an err-disabled state.
FL-A(config)#interface fa0/5
FL-A(config-if)#switchport port-security violation restrict
FL-A(config)#interface fa0/10
FL-A(config-if)#switchport port-security violation restrict
FL-A(config)#interface fa0/15
FL-A(config-if)#switchport port-security violation restrict
FL-A(config)#interface fa0/24
FL-A(config-if)#switchport port-security violation restrict
b. On FL-B, configure the virtual terminal lines to accept only SSH connections.
Use a domain name of ccnaPTSA.com.
FL-B(config)#hostname FL-B
FL-B(config)#line vty 0 4
FL-B(config-line)#login local
FL-B(config-line)#transport input ssh
FL-B(config)#line vty 5 15
FL-B(config-line)#login local
FL-B(config-line)#transport input ssh
Configure user-based authentication for the SSH connections with a user name of netadmin and
an encrypted secret password of SSHsecret9 . The user name and password must match the
values provided here exactly.
FL-B(config)#username netadmin password SSH_secret9
c. Ensure that all unused switch ports on FL-A have been secured as follows:
They should be assigned to VLAN 99.
They should all be in access mode.
They should be shutdown.
Should have been done in Step 2, but here they are anyway
Step 7: Configure Site 2 as a DHCP server for the hosts attached to the FL-A and FL-C
switches.
Task/How:
Configure three DHCP pools as follows:
Refer to the information in the Addressing Table.
Create a DHCP pool for hosts on VLAN 2 using the pool name vlan2pool.
Create a DHCP pool for hosts on VLAN 4 using the pool name vlan4pool.
Create a DHCP pool for hosts on VLAN 8 using the pool name vlan8pool.
All VLAN pool names must match the provided values exactly.
Exclude the first five addresses from each pool.
Task:
Hosts should be able to ping each other and external hosts after they have been correctly
addressed, where permitted.
Hosts on VLANs 2, 4, and 8 should be configured to receive addresses dynamically over
DHCP.
Hosts on VLAN 15 should be addressed statically as indicated in the Addressing Table. Once
configured, the hosts should be able to ping hosts on other networks.
Hosts on the LANs attached to Site 1 should be statically assigned addresses that enable them
to communicate with hosts on other networks, as indicated in the Addressing Table.
How:
Simply setup all the addressing manually through the GUI on each workstation from the IP
Addressing table
Quick Summary:
Attention: Rename the hostnames and VLAN names
Router - HQ (Main)
SW-A
SW-B
SW-C
hostname Bldg-1
no ip domain-lookup
enable secret cisco
line console 0
logging synchronous
password cisco
login
line aux 0
password cisco
login
line vty 0 15
password cisco
login
service password-encryption
banner motd #Authorized access only!#
interface serial 0/0/0
bandwidth 128
clock rate 128000
ip address 192.168.100.22 255.255.255.252
description 2-Central
ip ospf cost 7500
ip ospf message-digest-key 1 md5 xyz_OSPF
ip ospf authentication message-digest
no shutdown
exit
interface gi 0/0
ip address 192.168.8.1 255.255.255.0
description Manage-1A
no shutdown
interface gi 0/1
ip address 192.168.9.1 255.255.255.0
description Clerk-1C
no shutdown
exit
router ospf 1
router-id 1.1.1.1
passive-interface GigabitEthernet0/0
passive-interface GigabitEthernet0/1
area 0 authentication message-digest
network 192.168.100.20 0.0.0.3 area 0
network 192.168.8.0 0.0.0.255 area 1
network 192.168.9.0 0.0.0.255 area 1
no auto-summary
exit