Wireless Access Points (Part 2)

Size: px
Start display at page:

Download "Wireless Access Points (Part 2)"

Transcription

1 Wireless Access Points (Part 2) Details The lab is a virtual simulation of the Cisco Aironet 1200 Wireless Access Point (WAP). Initially the screen should be as in Figure 1. Figure 1: Initial startup screen All rights reserved. 1

2 Tutorial 2 This tutorial outlines some of the key configurations for a wireless access point. DHCP 1. It is possible to run a DHCP server to assign IP parameters to wireless nodes: (config)# ip dhcp pool socpool (config-dhcp)# network (config-dhcp)# lease 10 (config-dhcp)# exit -config Sets the range of addresses to be allocated, and sets the lease for 10 days Using the information from above what are the following: Why would the WAP run a DHCP server: In the above example, what will be the first IP address allocated: In the above example, what will be the last IP address allocated: In the DHCP it is also possible to exclude addresses from the pool: (config)# ip dhcp? (config)# ip dhcp excluded-address? (config)# ip dhcp excluded-address ? (config)# ip dhcp excluded-address config and for defining the ping timeout for DHCP: (config)# ip dhcp? (config)# ip dhcp ping? (config)# ip dhcp ping timeout? (config)# ip dhcp ping timeout 400 -config Other settings for DHCP are: All rights reserved. 2

3 (config)# ip dhcp pool socpool (config-dhcp)# dns-server (config-dhcp)# netbios-name-server (config-dhcp)# domain-name xyz.com -config Host table A local hosts table is useful in defining logical names for remote ports. For example to enable the host table for three remote hosts: (config)# ip? (config)# ip host? (config)# ip host mars? (config)# ip host mars (config)# ip host jupiter (config)# ip host saturn ( config)# end # show hosts -config CDP CDP (Cisco Discovery Protocol) is used to discover Cisco devices which connect to a given port. It is set globally on the device with cdp run, and then the timers are set as: (config)# cdp? (config)# cdp holdtime? (config)# cdp holdtime 120 (config)# cdp timer? (config)# cdp timer 50 (config)# end Using the show cdp command, determine the settings for CDP: To enable CDP on the WAP: (config)# cdp run (config)# end To enable CDP on an interface: (config)# int fa0 (config-if)# cdp? All rights reserved. 3

4 (config-if)# cdp enable (config-if)# end 2. To show CDP information: # show cdp? # show cdp neighbors # show cdp neighbors detail # show cdp neighbors traffic 3. To remove CDP from an interface the no command is inserted in front of the command which is to be removed: (config)# int fa0 (config-if)# no? (config-if)# no cdp enable (config-if)# end View the running-config, and verify that CDP has been removed from the port: Logging The logging facility in the wireless access point is important as it can be used to determine intrusions and also log warning/errors. The following defines logging: (config)# logging on (config)# logging buff? (config)# logging buff 8192 What is the minimum and maximum size of the buffer: There are several types of logging facilities including warning, debugging and critical. To set these for different logging facilities: (config)# logging buff? (config)# logging buff warning (config)# logging console critical (config)# logging monitor critical (config)# logging trap warning How many security levels, and what are they: All rights reserved. 4

5 The logging to the local buffer is fine for short-term logging, but eventually it will run out of space (or may be deleted by mistake). This is good practice is to log to a server or to a syslog server (with the logging host command), such as: (config)# logging buff? (config)# logging (config)# logging host SNMP The SNMP (Simple Network Management Protocol) is a powerful method of gaining information on the operation of the network. The snmp-server command is used to enable SNMP monitoring. The snmp-server community command is used to initialise SNMP, and set the community string (which is basically used as a type of password for the SNMP access). For example to define the read-only string to public: (config)# snmp-server? (config)# snmp-server community? (config)# snmp-server community public? (config)# snmp-server community public RO The RO defines read-only access, while RW defines read-write access. To setup the SNMP contact, the location: (config)# snmp-server? (config)# snmp-server contact fred smith (config)# snmp-server location room c6 SNMP contains a database of monitored network conditions, such as the number of errors in data packets, the IP addresses of the interfaces, and so on. It can also be setup to trigger on certain traps, such as on syslog traps. To enable all of SNMP traps so that all the data is monitored: (config)# snmp-server? (config)# snmp-server enable? (config)# snmp-server enable traps? (config)# snmp-server enable traps (config)# exit Which traps are available: Then to send these traps to a remote host (to All rights reserved. 5

6 (config)# snmp-server host? (config)# snmp-server host (config)# snmp-server host public To determine the status of the SNMP communications: # show snmp and to display the SNMP engine and remote engines: # show snmp engine and to display the SNMP group: # show snmp group SNMP uses an MIB database (Figure 1) to store its values. To display its contents: # show snmp mib As you will see, the MIB has a massive number of entries, and shows the power of the SNMP protocol. Which entry is likely to define the receiving power of the antenna: Which entry is likely to define the number of VLANs: Which entry is likely to define the system uptime: To show the currently pending SNMP requests: # show snmp pending To show the SNMP sessions: # show snmp sessions All rights reserved. 6

7 ICMP: IcmpInMsgs. IcmpInErrors. Etc. SNMP SNMP agent agent MIB TCP: tcprtoalgorithm. tcprtomin. tcprtomax. Etc. System: sysobjectid. sysuptime. syscontact. sysname. syslocation. UDP: udpindatagrams. udpnoports. udpinerrors. Etc. At (address translation): attable. Ip: ipforwarding. ipdefaultttl. ipinreceives. ipinhdrerrors. Etc. Interfaces: ifnumber. iftable. SNMP: snmpinpkts. snmpoutpkts. Etc. Figure 2: SNMP structure Hot standby The hot standby function is used to provide a backup to another access point, and is configured in the same way, so that it is fails, the hot standby device can become active, and associates the active clients, automatically. The only setting that will differ is the IP address of the device. In the following configuration, the MAC address of the device to be monitored is 1111.abcd.ef10. The timeout period in which the device will determine if the monitored device has stopped working is five seconds, and the poll time is two seconds: (config)# iapp? (config)# iapp standby? (config)# iapp standby mac? (config)# iapp standby mac 1111.abcd.ef10 (config)# iapp standby timeout? (config)# iapp standby timeout 5 (config)# iapp standby polltime? (config)# iapp standby polltime 2 What is the minimum and maximum timeout values: What is the minimum and maximum poll time values: All rights reserved. 7

8 And then to display the IAPP settings: # show iapp # show iapp? # show iapp rogue-ap-list # show iapp standby-parms # show iapp statistics Are there any rogue access points: Are the hot standby parameters correctly defined: Line console and VTY commands The CONSOLE connection on the wireless access point is typically used to gain access to the device when there is no network connection, and allows a high-level of access to the device. Thus is should be protected with a strong password. In the following, the console port is configured with a password of fred, and the timeout for a session of 50 seconds, and an executive timeout of 15 minutes: (config) # line? (config) # line con 0 (config-line) #? (config-line) # login (config-line) # password? (config-line) # password fred (config-line) # timeout? (config-line) # timeout login? (config-line) # timeout login response? (config-line) # timeout login response 50 (config-line) # exec-timeout 15 (config-line) # exit TELNET is an important protocol as it allows a remote connection from a terminal. The number of telnet sessions can be limited with the start and end terminal definition. In the following case, the number of terminal sessions is 16 (0 to 15), and freddy is assigned as the password: (config) # line vty 0 15 (config-line) # login (config-line) # password freddy (config-line) # logging synchronous (config-line) # timeout login response 50 (config-line) # exec-timeout 15 (config-line) # exit All rights reserved. 8

9 When the user logs in through TELNET they will be accessed for their password: User Access Verification Password: freddy Services There are many services that can be run on a wireless access point. These include a passwordencryption service, the DHCP service, and so on. (config) # service? List some of the available services: Password encryption service One useful service is for password encryption. Initially it can disabled with: (config) # no service password-encryption (config) # line con 0 (config-line) # login (config-line) # password fred (config-line) # exit What is the line for defining the password: Now enable the password encryption service and view the difference: (config) # service password-encryption (config) # line con 0 (config-line) # login (config-line) # password fred (config-line) # exit What is the line for defining the password: An important service is the one to timestamps the log and debug activities. For this: All rights reserved. 9

10 (config) # service timestamps? (config) # service timestamps log? (config) # service timestamps log datetime (config-line) # exit For this we can either define the timestamps as the current Date/Time or in terms of the UpTime. There are a number of TCP and UDP small server applications, such as ECHO, Discard, Daytime, and so on. These are enabled by default. Thus to view them in the runningconfig: What are the lines relating to tcp-small-servers and udp-small-servers: If we contain the wireless access point on the Daytime port (13), it produces the following: telnet Monday, March 1, :46:32-UTC These can cause security problems, as they allow a method of an intruder to gain access to the device, thus to stop them: (config) # no service tcp-small-servers (config) # no service udp-small-servers (config-line) # exit Are there lines relating to tcp-small-servers and udp-small-servers: Now if we were to access to the wireless access point we get: telnet Connecting To Could not open connection to the host, on port 13: Connect failed Thus, we have closed-off a port, which reduces the opportunities for someone to connect to the access point. Other services, such as finger, have particular problems related to security, but as they are disabled by default, they are not a particular problem. The DHCP service is enabled by default. If it is to be disabled, then: (config) # no service dhcp (config) # exit All rights reserved. 10

11 Banners and HTTP settings The banners can be set for different modes, such as Login, Exec, and for a message-of-the-day (MOTD), such as: (config) # banner? (config) # banner login hello (config) # banner motd system failure (config) # banner exec hello me (config) # exit What are the lines relating to the banners: To get rid of the banners: (config) # no? (config) # no banner login (config) # no banner motd (config) # no banner exec (config) # exit Are the lines relating to the banners gone: The HTTP service is important as it allows remote access through a Web browser. We can enable the server and define the username and password with: (config) # username? (config) # username fred password bert (config) # ip http? (config) # ip http server (config) # ip http authentication? (config) # ip http authentication local (config) # exit then, when the user tries to access to the wireless access point they will not be allowed to connect, unless the have the correct username and password, such as: All rights reserved. 11

12 which should give one of the following: Often a new HTTP port is required (to stop users from trying to access the Web page). Thus to change the port: (config) # ip http? (config) # ip http port? (config) # ip http port 8080 (config) # exit Now we cannot access the Web page with the standard port (80), and we must change the address with a colon to define the port, such as: All rights reserved. 12

13 We can also provide a helper-path with: (config) # ip http help-path (config) # exit Configuring as a repeater A repeater access point does not connect to a wired LAN, and basically forwards the data packets to another repeater or to a wireless access point which is connected to a wired network. With a repeater, of course, the Ethernet port will not operate. The repeater access point typically associates with an access point with has the best connectivity, whoever they can be setup to connect to a specific access point. In the following case, the access point will associate with the parent with the specified MAC address ( ): (config)# interface d0 (config-if)# ssid napier (config-ssid)# infrastructure-ssid (config-ssid)# exit (config-if)# station-role repeater (config-if)# dot11 extensions aironet (config-if)# parent (config-if)# parent aaaa.bbbb (config-if)# end In most cases the Cisco Aironet extensions must be enabled. All rights reserved. 13

14 Clock commands The main commands for clock are: # clock? # clock set? # clock set 11:00? # clock set 11:00 11? # clock set 11:00 11 jun? # clock set 11:00 11 jun 2006 History commands The main commands for history are: # clock? # terminal? # terminal history? # terminal history size? # terminal history size 100 # show history All rights reserved. 14

15 Tutorial 2 1. Complete the following challenges and note down the time you took to complete them: Chall. Description Time taken 10 DHCP Notes 11 Host Table 12 CDP 13 Banners and HTTP 14 CON and VTY 15 Clock 16 Logging 17 Services 18 SNMP 19 Hot standby 20 Repeater All rights reserved. 15

Author: Bill Buchanan. Wireless LAN. Unit 3: Wireless Infrastructure

Author: Bill Buchanan. Wireless LAN. Unit 3: Wireless Infrastructure Wireless LAN Unit 3: Wireless Infrastructure Areas covered: Wireless Infrastructures. Basic details on bridging and topologies. Wireless Data Logging and Device Discovery. Details on protocols such as

More information

Unit 3: Wireless Infrastructure

Unit 3: Wireless Infrastructure Wireless LAN CO72047 Unit 3: Wireless Infrastructure Prof. Bill Buchanan Contact: w.buchanan@napier.ac.uk Room: C.63 Telephone: X2759 MSN Messenger: w_j_buchanan@hotmail.com WWW: http://www.dcs.napier.ac.uk/~bill

More information

This document is a tutorial related to the Router Emulator which is available at:

This document is a tutorial related to the Router Emulator which is available at: Introduction This document is a tutorial related to the Router Emulator which is available at: http://www.dcs.napier.ac.uk/~bill/router.html A demo is also available at: http://www.dcs.napier.ac.uk/~bill/router_demo.htm

More information

Note that you can also use the password command but the secret command gives you a better encryption algorithm.

Note that you can also use the password command but the secret command gives you a better encryption algorithm. Router Device Security Lab Configuring Secure Passwords 1. Configure the enable secret and password enable password TRUSTME enable secret letmein Look at the configuration: show config terminal Note the

More information

Configuring Repeater and Standby Access Points

Configuring Repeater and Standby Access Points CHAPTER 19 This chapter descibes how to configure your access point as a hot standby unit or as a repeater unit. This chapter contains these sections: Understanding Repeater Access Points, page 19-2 Configuring

More information

Overview of the Cisco NCS Command-Line Interface

Overview of the Cisco NCS Command-Line Interface CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,

More information

Numerics INDEX. 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC g 3-6, x authentication 4-13

Numerics INDEX. 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC g 3-6, x authentication 4-13 INDEX Numerics 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC 1-8 802.11g 3-6, 3-9 802.1x authentication 4-13 A AAA server group 4-25 aaa authentication login command 4-24 aaa authorization command 4-27 aaa

More information

Network security session 9-2 Router Security. Network II

Network security session 9-2 Router Security. Network II Network security session 9-2 Router Security Network II Router security First line of defense of the network Compromise of a router can lead to many issues: Denial of network services Degrading of network

More information

Troubleshooting Network analysis Software communication tests and development Education. Protocols used for communication (10 seconds capture)

Troubleshooting Network analysis Software communication tests and development Education. Protocols used for communication (10 seconds capture) Lab 1 Wireshark Wireshark is an open source and free packet analyser used for many purposes, such as: Troubleshooting Network analysis Software communication tests and development Education This reports

More information

Lab 7 Configuring Basic Router Settings with IOS CLI

Lab 7 Configuring Basic Router Settings with IOS CLI Lab 7 Configuring Basic Router Settings with IOS CLI Objectives Part 1: Set Up the Topology and Initialize Devices Cable equipment to match the network topology. Initialize and restart the router and switch.

More information

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode 20 CHAPTER Configuring Repeater and Standby Access Points and Workgroup Bridge Mode This chapter describes how to configure your access point as a repeater, as a hot standby unit, or as a workgroup bridge.

More information

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode CHAPTER 19 Configuring Repeater and Standby Access Points and Workgroup Bridge Mode This chapter descibes how to configure your access point as a repeater, as a hot standby unit, or as a workgroup bridge.

More information

Chapter 10 Lab 10-2, Securing VLANs INSTRUCTOR VERSION

Chapter 10 Lab 10-2, Securing VLANs INSTRUCTOR VERSION CCNPv7.1 SWITCH Chapter 10 Lab 10-2, Securing VLANs INSTRUCTOR VERSION Topology Objectives Background Secure the server farm using private VLANs. Secure the staff VLAN from the student VLAN. Secure the

More information

GoCertify Advanced Cisco CCIE Lab Scenario # 1

GoCertify Advanced Cisco CCIE Lab Scenario # 1 GoCertify Advanced Cisco CCIE Lab Scenario # 1 (http://www.gocertify.com) IPexpert, Inc. is a leading provider in on-line Cisco CCNA, CCNP and CCIE training material. For more information please visit

More information

Lab - Configuring Basic DHCPv4 on a Router (Solution)

Lab - Configuring Basic DHCPv4 on a Router (Solution) (Solution) Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/0 192.168.0.1 255.255.255.0 N/A G0/1 192.168.1.1 255.255.255.0 N/A S0/0/0 (DCE) 192.168.2.253

More information

Chapter 2. Switch Concepts and Configuration. Part II

Chapter 2. Switch Concepts and Configuration. Part II Chapter 2 Switch Concepts and Configuration Part II CCNA3-1 Chapter 2-2 Switch Concepts and Configuration Configuring Switch Security MAC Address Flooding Passwords Spoofing Attacks Console Security Tools

More information

Getting Started with the VG248

Getting Started with the VG248 CHAPTER 2 Before you can configure the telephony features on the VG248 to interact with the analog phones, you must first configure the basic network, SNMP, and password settings. These settings enable

More information

Exam E1 Copyright 2010 Thaar AL_Taiey

Exam E1 Copyright 2010 Thaar AL_Taiey Exam E1 2 Exam E1 E1-1. Which of the following statements is true regarding the internetwork shown in Figure E1-1? (Select all that apply) Figure E1-1 A Sample Internetwork A. The link number 15 uses a

More information

Lab Using the CLI to Gather Network Device Information Topology

Lab Using the CLI to Gather Network Device Information Topology Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A Lo0 209.165.200.225 255.255.255.224 N/A S1 VLAN 1 192.168.1.11 255.255.255.0

More information

Skills Assessment Student Training

Skills Assessment Student Training Skills Assessment Student Training Topology Assessment Objectives Part 1: Initialize Devices (6 points, 5 minutes) Part 2: Configure Device Basic Settings (33 points, 20 minutes) Part 3: Configure Switch

More information

3 Wireless Emulator (Challenges)

3 Wireless Emulator (Challenges) 3 Wireless Emulator (Challenges) 3.1 Introduction The following relates to the wireless emulator challenges. 3.2 Challenge 1 (BVI 1) The following sets up the BVI 1 port: > enable (config)# int bvi 1 (config-if)#

More information

Laboration 2 Troubleshooting Switching and First-Hop Redundancy

Laboration 2 Troubleshooting Switching and First-Hop Redundancy Laboration 2 Troubleshooting Switching and First-Hop Redundancy Topology All contents are Copyright 1992 2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1

More information

Lab - Configuring a Switch Management Address

Lab - Configuring a Switch Management Address Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway S1 VLAN 1 192.168.1.2 255.255.255.0 N/A PC-A NIC 192.168.1.10 255.255.255.0 N/A Part 1: Configure a Basic Network

More information

CCNA Semester 2 labs. Labs for chapters 2 10

CCNA Semester 2 labs. Labs for chapters 2 10 CCNA Semester 2 labs Labs for chapters 2 10 2.2.2.5 Lab - Configuring IPv4 Static and Default Routes 2.3.2.4 Lab - Troubleshooting Static Routes 3.2.1.9 Lab - Configuring Basic RIPv2 5.2.2.9 Lab - Configuring

More information

Cisco WAAS Software Command Summary

Cisco WAAS Software Command Summary 2 CHAPTER This chapter summarizes the Cisco WAAS 4.0.7 software commands. lists the WAAS commands (alphabetically) and indicates the command mode for each command. The commands used to access modes are

More information

Lab Guide 1 - Basic Configuration and Interface Configuration

Lab Guide 1 - Basic Configuration and Interface Configuration IXP Workshop Lab Lab Guide 1 - Basic Configuration and Interface Configuration Objective: All the workshop lab routers are set to the default configuration and cabling requirements are prebuild according

More information

Lecture (02) Switch remote configuration peer2peer star network clients/server star network Traffic analysis using Packet Tracer

Lecture (02) Switch remote configuration peer2peer star network clients/server star network Traffic analysis using Packet Tracer Lecture (02) Switch remote configuration peer2peer star network clients/server star network Traffic analysis using Packet Tracer Dr. Ahmed M. ElShafee ١ Topology ٢ Preparation ٣ Commands summery ٤ enabl

More information

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND) 100-105.exam Number: 100-105 Passing Score: 800 Time Limit: 120 min CISCO 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND) Exam A QUESTION 1 Which route source code represents the routing

More information

Lab Configuring Dynamic and Static NAT (Solution)

Lab Configuring Dynamic and Static NAT (Solution) (Solution) Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway Gateway G0/1 192.168.1.1 255.255.255.0 N/A S0/0/1 209.165.201.18 255.255.255.252 N/A ISP S0/0/0 (DCE)

More information

Skills Assessment Student Training Exam

Skills Assessment Student Training Exam Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (2 points, 5 minutes) Part 2: Configure Device Basic Settings (18 points, 20 minutes) Part 3: Configure

More information

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode CHAPTER 19 Configuring Repeater and Standby Access Points and Workgroup Bridge Mode This chapter describes how to configure your access point as a repeater, as a hot standby unit, or as a workgroup bridge.

More information

Chapter 3 Lab 3-1, Assembling Maintenance and Troubleshooting Tools

Chapter 3 Lab 3-1, Assembling Maintenance and Troubleshooting Tools Chapter 3 Lab 3-1, Assembling Maintenance and Troubleshooting Tools Physical Topology All contents are Copyright 1992 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.

More information

Lab Configuring Dynamic and Static NAT (Instructor Version Optional Lab)

Lab Configuring Dynamic and Static NAT (Instructor Version Optional Lab) (Instructor Version Optional Lab) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional activities are designed to enhance understanding and/or

More information

Hot Standby Access Points

Hot Standby Access Points Hot Standby Access Points This module describes how to configure your wireless device as a hot standby unit in the following sections: Understanding Hot Standby, page 1 Configuring a Hot Standby Access

More information

Laboration 1 Examine the Topology and Basic Troubleshooting Commands

Laboration 1 Examine the Topology and Basic Troubleshooting Commands Laboration 1 Examine the Topology and Basic Troubleshooting Commands Topology All contents are Copyright 1992 2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page

More information

CCNA 1 Chapter 2 v5.0 Exam Answers %

CCNA 1 Chapter 2 v5.0 Exam Answers % CCNA 1 Chapter 2 v5.0 Exam Answers 2015 100% 1. Which two features are characteristics of flash memory? (Choose two.) Flash provides nonvolatile storage. Flash receives a copy of the IOS from RAM when

More information

Cisco Router Security: Principles and Practise. The foundation of network security is router security.

Cisco Router Security: Principles and Practise. The foundation of network security is router security. The foundation of network security is router security. 1) Router security within a general IT security plan, IOS software and standard access. 2) Password security and authentication. 3) Services, applications

More information

Lab 8.5.2: Troubleshooting Enterprise Networks 2

Lab 8.5.2: Troubleshooting Enterprise Networks 2 Lab 8.5.2: Troubleshooting Enterprise Networks 2 Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/0 192.168.10.1 255.255.255.0 N/A R1 Fa0/1 192.168.11.1 255.255.255.0

More information

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418 This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help

More information

PT Activity: Configure AAA Authentication on Cisco Routers

PT Activity: Configure AAA Authentication on Cisco Routers PT Activity: Configure AAA Authentication on Cisco Routers Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask R1 Fa0/0 192.168.1.1 255.255.255.0 S0/0/0 10.1.1.2

More information

ICND1. Switch Configuration Lab. All configurations have been set to factory defaults for these labs

ICND1. Switch Configuration Lab. All configurations have been set to factory defaults for these labs ICND1 Switch Configuration Lab TOPOLOGY 3xPC (hosts) 2x2950 (Layer 2 Switches) 1x3560 (Layer 3 Switch) 5x2811 (Routers, unused in this set of labs) All configurations have been set to factory defaults

More information

Troubleshooting Tools. Tools for Gathering Information

Troubleshooting Tools. Tools for Gathering Information Internetwork Expert s CCNP Bootcamp Troubleshooting Tools http:// Tools for Gathering Information Before implementing a fix, information must be gathered about a problem to eliminate as many variables

More information

Lab Configure Basic AP Security through IOS CLI

Lab Configure Basic AP Security through IOS CLI Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following

More information

Lab Configuring Switch Security Features Topology

Lab Configuring Switch Security Features Topology Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 172.16.99.1 255.255.255.0 N/A S1 VLAN 99 172.16.99.11 255.255.255.0 172.16.99.1 PC-A NIC 172.16.99.3

More information

Advanced IPv6 Training Course. Lab Manual. v1.3 Page 1

Advanced IPv6 Training Course. Lab Manual. v1.3 Page 1 Advanced IPv6 Training Course Lab Manual v1.3 Page 1 Network Diagram AS66 AS99 10.X.0.1/30 2001:ffXX:0:01::a/127 E0/0 R 1 E1/0 172.X.255.1 2001:ffXX::1/128 172.16.0.X/24 2001:ff69::X/64 E0/1 10.X.0.5/30

More information

Applied Cisco Networking (CCNP BCMSN)

Applied Cisco Networking (CCNP BCMSN) Applied Cisco Networking (CCNP BCMSN) Module Leader: Prof Bill Buchanan Module number: C032061 Email: w.buchanan@napier.ac.uk Telephone: X2759 MSN Messenger: w_j_buchanan@hotmail.com Version: Semester

More information

Using the Web Graphical User Interface

Using the Web Graphical User Interface Prerequisites for Using the Web GUI, page 1 Information About Using The Web GUI, page 1 Connecting the Console Port of the Device, page 3 Logging On to the Web GUI, page 3 Enabling Web and Secure Web Modes,

More information

Configure Site Network Settings

Configure Site Network Settings About Global Network Settings, page 1 About Device Credentials, page 2 Configure Global Device Credentials, page 4 Configure IP Address Pools, page 9 Configure Global Network Servers, page 9 Configure

More information

Configuring SNMP CHAPTER. This chapter describes how to configure the Simple Network Management Protocol (SNMP) on your access point.

Configuring SNMP CHAPTER. This chapter describes how to configure the Simple Network Management Protocol (SNMP) on your access point. CHAPTER 18 This chapter describes how to configure the Simple Network Management Protocol (SNMP) on your access point. Note For complete syntax and usage information for the commands used in this chapter,

More information

CCNA 1 Chapter 2 v5.0 Exam Answers 2013

CCNA 1 Chapter 2 v5.0 Exam Answers 2013 CCNA 1 Chapter 2 v5.0 Exam Answers 2013 1. Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was issued, but the ping was not successful. Other switches in the same

More information

Lab Configuring and Verifying Standard IPv4 ACLs Topology

Lab Configuring and Verifying Standard IPv4 ACLs Topology Topology 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 10 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.10.1

More information

DoS Attacks Malicious Code Attacks Device Hardening Social Engineering The Network Security Wheel

DoS Attacks Malicious Code Attacks Device Hardening Social Engineering The Network Security Wheel CCNA4 Chapter 4 * DoS Attacks DoS attacks are the most publicized form of attack and also among the most difficult to eliminate. DoS attacks prevent authorized people from using a service by consuming

More information

Lab Configuring and Verifying Extended ACLs Topology

Lab Configuring and Verifying Extended ACLs Topology Topology 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.10.1

More information

Lab Configuring and Verifying Standard IPv4 ACLs (Instructor Version Optional Lab)

Lab Configuring and Verifying Standard IPv4 ACLs (Instructor Version Optional Lab) (Instructor Version Optional Lab) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional activities are designed to enhance understanding and/or

More information

Lab - Examining Telnet and SSH in Wireshark

Lab - Examining Telnet and SSH in Wireshark Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A PC-A NIC 192.168.1.3 255.255.255.0 192.168.1.1 Part 1: Configure the Devices

More information

How to Configure a Cisco Router Behind a Non-Cisco Cable Modem

How to Configure a Cisco Router Behind a Non-Cisco Cable Modem How to Configure a Cisco Router Behind a Non-Cisco Cable Modem Document ID: 19268 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify

More information

Configuring System Message Logs

Configuring System Message Logs Information About, on page 1 How to Configure System Message Logs, on page 4 Monitoring and Maintaining System Message Logs, on page 12 Configuration Examples for System Message Logs, on page 12 Additional

More information

7 Filtering and Firewalling

7 Filtering and Firewalling 7 Filtering and Firewalling 7.1 Introduction Security is becoming a major concern in IT, and A major concern in networking and the Internet, and wireless systems are probably more open to abuse than any

More information

Lab 1-2Connecting to a Cisco Router or Switch via Console. Lab 1-6Basic Graphic Network Simulator v3 Configuration

Lab 1-2Connecting to a Cisco Router or Switch via Console. Lab 1-6Basic Graphic Network Simulator v3 Configuration MODULE1 GETTING STARTED WITH YOUR CISCO LAB Lab 1-1Identifying Router Components and Accessories Lab 1-2Connecting to a Cisco Router or Switch via Console Lab 1-3Identifying Router & Switch IOS Software

More information

Three interface Router without NAT Cisco IOS Firewall Configuration

Three interface Router without NAT Cisco IOS Firewall Configuration Three interface Router without NAT Cisco IOS Firewall Configuration Document ID: 13893 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations

More information

Configuring Client Profiling

Configuring Client Profiling Prerequisites for, page 1 Restrictions for, page 2 Information About Client Profiling, page 2, page 3 Configuring Custom HTTP Port for Profiling, page 4 Prerequisites for By default, client profiling will

More information

Lab Designing and Implementing a VLSM Addressing Scheme. Topology. Objectives. Background / Scenario

Lab Designing and Implementing a VLSM Addressing Scheme. Topology. Objectives. Background / Scenario CSNB214 Packet Tracer Lab Designing and Implementing a VLSM Addressing Scheme Topology Objectives Part 1: Examine Network Requirements Part 2: Design the VLSM Address Scheme Part 3: Cable and Configure

More information

Chapter 8: Lab B: Configuring a Remote Access VPN Server and Client

Chapter 8: Lab B: Configuring a Remote Access VPN Server and Client Chapter 8: Lab B: Configuring a Remote Access VPN Server and Client Topology IP Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1 192.168.1.1 255.255.255.0 N/A

More information

Buy full file at

Buy full file at 14 Chapter 2 LAN Redundancy Chapter 2 LAN Redundancy 2.0.1.2 Class Activity Stormy Traffic ( ) Objective Explain the purpose of the Spanning Tree Protocol (STP) in a switched LAN environment with redundant

More information

Network Infrastructure Filtering at the border. PacNOG19 28th November - 2nd December 2016 Nadi, Fiji

Network Infrastructure Filtering at the border. PacNOG19 28th November - 2nd December 2016 Nadi, Fiji Network Infrastructure Filtering at the border PacNOG19 28th November - 2nd December 2016 Nadi, Fiji Issue Date: [Date] Revision: [XX] What we have in network? Router Switch CPE (ADSL Router / WiFi Router)

More information

Using the Web Graphical User Interface

Using the Web Graphical User Interface Prerequisites for Using the Web GUI, page 1 Information About Using The Web GUI, page 2 Connecting the Console Port of the Switch, page 3 Logging On to the GUI, page 4 Enabling Web and Secure Web Modes,

More information

Lab Managing Router Configuration Files with Terminal Emulation Software

Lab Managing Router Configuration Files with Terminal Emulation Software Lab Managing Router Configuration Files with Terminal Emulation Software Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS CISCO 100-101 EXAM QUESTIONS & ANSWERS Number: 100-101 Passing Score: 800 Time Limit: 120 min File Version: 35.5 http://www.gratisexam.com/ CISCO 100-101 EXAM QUESTIONS & ANSWERS Exam Name: CCNA Interconnecting

More information

Chapter 5 Lab 5-1 Inter-VLAN Routing INSTRUCTOR VERSION

Chapter 5 Lab 5-1 Inter-VLAN Routing INSTRUCTOR VERSION CCNPv7.1 SWITCH Chapter 5 Lab 5-1 Inter-VLAN Routing INSTRUCTOR VERSION Topology Objectives Implement a Layer 3 EtherChannel Implement Static Routing Implement Inter-VLAN Routing Background Cisco's switching

More information

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview This course will teach students about building a simple network, establishing internet connectivity, managing network device security,

More information

Configuring Management Access

Configuring Management Access 37 CHAPTER This chapter describes how to access the ASA for system management through Telnet, SSH, and HTTPS (using ASDM), how to authenticate and authorize users, how to create login banners, and how

More information

HP 5120 SI Switch Series

HP 5120 SI Switch Series HP 5120 SI Switch Series Network Management and Monitoring Configuration Guide Part number: 5998-1813 Software version: Release 1505 Document version: 6W102-20121111 Legal and notice information Copyright

More information

Discover Your Network

Discover Your Network About Discovery, on page 1 Discovery Prerequisites, on page 2 Discovery Credentials, on page 2 Preferred Management IP Address, on page 4 Discovery Configuration Guidelines and Limitations, on page 5 Perform

More information

Lab - Troubleshooting DHCPv4 Topology

Lab - Troubleshooting DHCPv4 Topology Topology 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 9 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/0 192.168.0.1

More information

Configuring CDP. Understanding CDP CHAPTER. This chapter describes how to configure Cisco Discovery Protocol (CDP) on the Catalyst 3560 switch.

Configuring CDP. Understanding CDP CHAPTER. This chapter describes how to configure Cisco Discovery Protocol (CDP) on the Catalyst 3560 switch. 21 CHAPTER This chapter describes how to configure Cisco Discovery Protocol (CDP) on the Catalyst 3560 switch. Note For complete syntax and usage information for the commands used in this chapter, refer

More information

Lab Establishing and Verifying a Telnet Connection Instructor Version 2500

Lab Establishing and Verifying a Telnet Connection Instructor Version 2500 Lab 4.2.2 Establishing and Verifying a Telnet Connection Instructor Version 2500 Objective Establish a Telnet connection to a remote router. Verify that the application layer between source and destination

More information

Case Study. Routing & Switching. Cisco Networking Academy Routing and Switching: Scaling Network Case Study

Case Study. Routing & Switching. Cisco Networking Academy Routing and Switching: Scaling Network Case Study Case Study Routing & Switching Cisco Networking Academy Routing and Switching: Scaling Network Case Study Overview and Objectives This case study allows students to build and configure a complex network

More information

Lab Configuring Port Address Translation (PAT) (Instructor Version)

Lab Configuring Port Address Translation (PAT) (Instructor Version) (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Objectives Device Interface IP Address Subnet Mask

More information

Chapter 5 Lab 5-2 DHCP INSTRUCTOR VERSION

Chapter 5 Lab 5-2 DHCP INSTRUCTOR VERSION CCNPv7.1 SWITCH Chapter 5 Lab 5-2 DHCP INSTRUCTOR VERSION Topology Objectives Configure DHCP for IPv4 Configure Stateless DHCP for IPv6 Configure Stateful DHCP for IPv6 Background To practice the various

More information

CCNA 4 - Final Exam (B)

CCNA 4 - Final Exam (B) CCNA 4 - Final Exam (B) 1. Identify the factors that contribute to congestion on an Ethernet LAN. (Choose three.) improper placement of enterprise level servers addition of hosts to a physical segment

More information

Lab Configuring Basic Switch Settings (Solution)

Lab Configuring Basic Switch Settings (Solution) (Solution) Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway S1 VLAN 99 192.168.1.2 255.255.255.0 192.168.1.1 PC-A NIC 192.168.1.10 255.255.255.0 192.168.1.1

More information

Lab Configuring Basic RIPv2 (Solution)

Lab Configuring Basic RIPv2 (Solution) (Solution) Topology 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 15 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway

More information

Chapter 3 Command List

Chapter 3 Command List Chapter 3 Command List This chapter lists all the commands in the CLI. The commands are listed in two ways: All commands are listed together in a single alphabetic list. See Complete Command List on page

More information

SSG Configuration Example

SSG Configuration Example APPENDIX A Example A-1 is a sample SSG configuration for the Cisco 10000 series router based on the topology in Figure A-1. The configuration includes AAA, PPP, SSG, and RADIUS. The SSG configuration enables

More information

cable modem dhcp proxy nat on Cisco Cable Modems

cable modem dhcp proxy nat on Cisco Cable Modems cable modem dhcp proxy nat on Cisco Cable Modems Document ID: 12176 Contents Introduction Prerequisites Requirements Components Used Conventions Dynamic NAT Versus Static NAT Configuration Using cable

More information

Cisco Cookbook. Kevin Dooley and IanJ. Brown. O'REILLY 4 Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo

Cisco Cookbook. Kevin Dooley and IanJ. Brown. O'REILLY 4 Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Cisco Cookbook Kevin Dooley and IanJ. Brown O'REILLY 4 Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Table of Contents Preface xv 1. Router Configuration and File Management 1 1.1 Configuring

More information

Configuring an Access Point as a Local Authenticator

Configuring an Access Point as a Local Authenticator CHAPTER 9 Configuring an Access Point as a Local Authenticator This chapter describes how to configure the access point as a local authenticator to serve as a stand-alone authenticator for a small wireless

More information

Cisco.BrainDump v by.MuTe

Cisco.BrainDump v by.MuTe Cisco.BrainDump.100-101.v2013-06-25.by.MuTe Number: 100-101 Passing Score: 804 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ ICND1 100-101 Practice Exam QUESTION 1 Which three statements

More information

Lab 2.8.2: Challenge Static Route Configuration

Lab 2.8.2: Challenge Static Route Configuration Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway BRANCH HQ ISP PC1 PC2 Web Server Fa0/0 S0/0/0 Fa0/0 S0/0/0 S0/0/1 209.165.201.2 255.255.255.252 Fa0/0 209.165.200.225

More information

Configuring System Message Logs

Configuring System Message Logs Finding Feature Information, on page 1 Restrictions for, on page 1 Information About, on page 2 How to Configure System Message Logs, on page 4 Monitoring and Maintaining System Message Logs, on page 12

More information

Lab - Troubleshooting Standard IPv4 ACL Configuration and Placement Topology

Lab - Troubleshooting Standard IPv4 ACL Configuration and Placement Topology Lab - Troubleshooting Standard IPv4 ACL Configuration and Placement Topology 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8 Addressing Table Objectives

More information

Router pod documentation

Router pod documentation Router pod documentation Note: DO NOT USE COPY RUNNING STARTUP, as this may reset the privileged password. If you change the privileged password, and save the configuration, please tell your lecturer as

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

Lab Student Lab Orientation

Lab Student Lab Orientation Lab 1.1.1 Student Lab Orientation Objective In this lab, the students will complete the following tasks: Review the lab bundle equipment Understand the security pod topology Understand the pod naming and

More information

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services CHAPTER 11 Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services This chapter describes how to configure your access point/bridges for wireless domain services

More information

Chapter 8 Lab 8-1, IP Service Level Agreements and Remote SPAN in a Campus Environment INSTRUCTOR VERSION

Chapter 8 Lab 8-1, IP Service Level Agreements and Remote SPAN in a Campus Environment INSTRUCTOR VERSION CCNPv7.1 SWITCH Chapter 8 Lab 8-1, IP Service Level Agreements and Remote SPAN in a Campus Environment INSTRUCTOR VERSION Topology Objectives Background Configure trunking, VTP, and SVIs. Implement IP

More information

Using the Command-Line Interface

Using the Command-Line Interface Information About, page 1 How to Use the CLI to Configure Features, page 5 Information About Command Modes The Cisco IOS user interface is divided into many different modes. The commands available to you

More information

CHAPTER 2 ACTIVITY

CHAPTER 2 ACTIVITY CHAPTER 2 ACTIVITY 2.1.1.1 1. CLI stands for 2. GUI stands for 3. Write the step you used to go to CLI interface on Windows 4. The OS, normally loads from a disk drive, into RAM. 5. The portion of the

More information

Lab : Challenge OSPF Configuration Lab. Topology Diagram. Addressing Table. Default Gateway. Device Interface IP Address Subnet Mask

Lab : Challenge OSPF Configuration Lab. Topology Diagram. Addressing Table. Default Gateway. Device Interface IP Address Subnet Mask Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/0 HQ S0/0/0 S0/0/1 Lo1 10.10.10.1 255.255.255.252 Fa0/0 Branch1 S0/0/0 S0/0/1 Fa0/0 Branch2 S0/0/0 S0/0/1 PC1

More information

Configuring System Message Logs

Configuring System Message Logs Restrictions for, page 1 Information About, page 1 How to Configure System Message Logs, page 4 Monitoring and Maintaining System Message Logs, page 13 Configuration Examples for System Message Logs, page

More information