Lab Student Lab Orientation

Similar documents
Lab Student Lab Orientation

Device Interface IP Address Subnet Mask Default Gateway

Lab Configure Cisco IOS Firewall CBAC

Lab Configure Routing Authentication and Filtering

Lab 9.6.3: EIGRP Troubleshooting Lab

Lab : OSPF Troubleshooting Lab

Lab 8.5.2: Troubleshooting Enterprise Networks 2

Lab Configure Cisco IOS Firewall CBAC on a Cisco Router

Lab : Challenge OSPF Configuration Lab. Topology Diagram. Addressing Table. Default Gateway. Device Interface IP Address Subnet Mask

Lab: RIP v2 with VLSM

Skills Assessment Student Training

Lab Configuring an ISR with SDM Express

Lab 7 Configuring Basic Router Settings with IOS CLI

Lab 9.6.2: Challenge EIGRP Configuration Lab

CCNA 1 Chapter 2 v5.0 Exam Answers %

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM

Lab Correcting RIPv2 Routing Problems

Lab Using the CLI to Gather Network Device Information Topology

Lab Configuring the PIX Security Appliance as a DHCP Server

Lab Configuring Dynamic and Static NAT (Solution)

Lab Troubleshooting VTP Configuration

Lab 1. CLI Navigation. Scenario. Initial Configuration for R1

Lab Establishing and Verifying a Telnet Connection Instructor Version 2500

Lab Configuring and Verifying Extended ACLs Topology

Lab Configuring Dynamic and Static NAT (Instructor Version Optional Lab)

This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and

Skills Assessment Student Training Exam

CCNA 1 Chapter 2 v5.0 Exam Answers 2013

Lab Well-Known Port Numbers and Multiple Sessions

Laboration 1 Examine the Topology and Basic Troubleshooting Commands

CCNA 1 Chapter 11 V4.0 Answers

Lab Using the Boot System Command. Objective. Background/Preparation

Chapter 4. Network Security. Part II

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats

CWT Hands-On Summation Lab 1 Checkpoints 1-8

Lab 3.4.6a Configure the PIX Security Appliance using Setup Mode and ASDM Startup Wizard

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Lab 9.6.1: Basic EIGRP Configuration Lab

Lab Troubleshooting IP Address Issues Instructor Version 2500

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM

ICND1. Switch Configuration Lab. All configurations have been set to factory defaults for these labs

Router pod documentation

DoS Attacks Malicious Code Attacks Device Hardening Social Engineering The Network Security Wheel

This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and

MiPDF.COM. 3. Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?

Lab10- Configuring EIGRP

Skills Assessment Student Training Exam

1. Which OSI layers offers reliable, connection-oriented data communication services?

Skills Assessment Student Practice

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Security Router Pod Planning and Installation Guide

Hochschule Bremen Networking Lab

Lab Securing Network Devices

Chapter 3 Lab 3-1, Assembling Maintenance and Troubleshooting Tools

Lab 1.3.2: Review of Concepts from Exploration 1 - Challenge

Chapter 8: Lab B: Configuring a Remote Access VPN Server and Client

Lab Configuring 802.1Q Trunk-Based Inter-VLAN Routing (Instructor Version Optional Lab)

Lab VTY Restriction Instructor Version 2500

Lab Configure Basic AP Security through IOS CLI

Lab Configuring Switch Security Features Topology

Lab - Troubleshooting VLAN Configurations (Instructor Version Optional Lab)

Lab 1.4.6B Implementing Port Security

Lab Configuring Basic RIPv2 (Solution)

CCNA Semester 2 labs. Labs for chapters 2 10

Lab Configuring DHCP

Lab Configuring Per-Interface Inter-VLAN Routing (Solution)

Advanced IPv6 Training Course. Lab Manual. v1.3 Page 1

Accessing the WAN Chapter 4 - PART II Modified by Tony Chen 07/20/2008

CCNA 1 Final Exam Answers UPDATE 2012 eg.2

Lab Configure Basic AP security through GUI

LAB 3 Basic Switch Configuration Commands

Lab 6.4.2: Challenge Inter-VLAN Routing

Lab Configuring Per-Interface Inter-VLAN Routing (Instructor Version)

Lab Configuring Static Routes Instructor Version 2500

Lab - Building a Switch and Router Network

Book Heading. 2 Configurating Static Routing. 7 Router Security VLAN Network Router Security Network Infrastructure Design

Exam E1 Copyright 2010 Thaar AL_Taiey

Deploying Cisco ASA Firewall Features (FIREWALL) v1.0. Global Knowledge European Remote Labs Instructor Guide

Introduction to Networks: Case Study, Option 2

Retake - Skills Assessment Student Training (Answer Key)

Lab 2.8.2: Challenge Static Route Configuration

King Fahd University of Petroleum & Minerals. Configuration of Routers and Establishing Routed Networks

Lab Guide 1 - Basic Configuration and Interface Configuration

Lab Designing and Implementing a VLSM Addressing Scheme. Topology. Objectives. Background / Scenario

Lab - Examining Telnet and SSH in Wireshark

Lab - Configuring Basic DHCPv4 on a Router (Solution)

4(b): Assign the IP address on the Serial interface of Router. Console Cable

Module 11 Advanced Router Configuration

Deploying Cisco ASA Firewall Solutions (FIREWALL) v2.0. Global Knowledge European Remote Labs Instructor Guide

PT Activity: Configure AAA Authentication on Cisco Routers

Lab 5.6.2: Challenge RIP Configuration

Skills Assessment (EIGRP) Student Training Exam

Lab 3: Basic Device Configuration

Troubleshooting Network analysis Software communication tests and development Education. Protocols used for communication (10 seconds capture)

UniNets CCNA Security LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL UniNets CCNA LAB MANUAL

Lab - Troubleshooting ACL Configuration and Placement Topology

Lab Troubleshooting RIP

Case Study. Routing. Cisco Networking Academy Program CCNA 2: Routers and Routing Basics v3.0

CCNA 4 - Final Exam (B)

Case Study. Routing. Cisco Networking Academy Program CCNA 2: Routers and Routing Basics v3.1

Transcription:

Lab 1.1.1 Student Lab Orientation Objective In this lab, the students will complete the following tasks: Review the lab bundle equipment Understand the security pod topology Understand the pod naming and addressing scheme Load the default lab configurations Cable the standard lab topology Test connectivity Scenario This lab describes the basics of cabling and configuring the standard lab topology for this course... Students will become familiar with the physical and logical topology that will be used throughout the course. To avoid problems with the lab exercises, proper lab setup and connectivity is required before configuring security. In real world scenarios, it is important to check the network for basic connectivity before proceeding with more advanced configurations. Figure 1

Figure 2 illustrates the lab network environment used in the VPN Client to IOS Firewall router lab activities: Figure 2 Preparation There are two basic segments for the router topology: Name Trust Level Common Network Physical Port Inside Trusted Private-LAN 10.0.P.0/24 Ethernet Outside Untrusted Public-WAN 172.30.P.0/24 Serial In most of the labs, the physical interface will not be specific as Ethernet0, Fa0/0, E0/0 and so on. Instead, a lab will instruct students to configure the outside interface, the inside interface or the DMZ interface. Students will have to configure the interfaces based on the router or PIX Security Appliance model and interface characteristics. Note that each topology figure indicates a specific numbering, naming and addressing scheme. The basic lab topology includes two pods. Each pod consists of a router, a PIX Security Appliance, a switch, a student PC, and an inside server. Some academies may have up to 10 pods. Therefore, the labs use P and Q values The P value in the addressing and naming scheme refers to the assigned Pod router that will be assigned to a team consisting of one to four students. The Q value in the naming and addressing scheme is used when testing the security or connectivity with the peer team. For example, the team on Pod 1 router is asked to Ping the neighbor router at 172.30.Q.2. In this case the Q will be substituted with a 2. The basic tasks in most labs are: Configure security on the pod device, such as router or PIX Security Appliance.

Test the security and services through the pod device and through the peer device. When testing connectivity and security configurations, be careful to observe the prompt. Below are some possible prompts: C:\ Router> http://10.0.p.12 ftp://172.26.26.50 This is important since testing will be performed from the DOS prompt, a device prompt, or a Web browser. Command List In this lab, the following commands will be used to configure the pod routers: Command copy run start copy tftp flash copy tftp start enable show interface show ip interface show ip route show running-config show startup-config show version Description Stores the current configuration in RAM into NVRAM. Downloads a new image from the TFTP server to Flash memory. Downloads a configuration from the TFTP server into the NVRAM Turns on privileged commands. Displays statistics for all interfaces configured on the router. Displays the status and global parameters associated with an interface. Displays the contents of the IP routing table. Displays the current configuration in RAM Displays the saved configuration that is stored in NVRAM Displays the configuration of the system hardware, the software version, the names and sources of configuration files, and the boot images. Load Default Configurations on Pod and RBB Routers a. Reload, configure and verify Pod routers. b. Reload, configure and verify RBB router. c. Save the configuration files on an external medium. You will need them later.

POD Router 1 POD Router 2 hostname Router1 hostname Router2 logging console logging console enable password cisco enable password cisco username sdm privilege 15 password 0 sdm username sdm privilege 15 password 0 sdm no ip domain-lookup no ip domain-lookup ip dhcp excluded-address 10.0.1.1 10.0.1.12 ip dhcp excluded-address 10.0.2.1 10.0.2.12 ip dhcp pool POD1_INSIDE ip dhcp pool POD2_INSIDE network 10.0.1.0 255.255.255.0 network 10.0.2.0 255.255.255.0 default-router 10.0.1.2 default-router 10.0.2.2 interface FastEthernet0/0 interface FastEthernet 0/0 description inside description inside ip address 10.0.1.2 255.255.255.0 ip address 10.0.2.2 255.255.255.0 interface FastEthernet0/1 interface FastEthernet0/1 description outside description outside ip address 172.30.1.2 55.255.255.0 ip address 172.30.2.2 255.255.255.0 router eigrp 1 router eigrp 1 network 10.0.0.0 network 10.0.0.0 network 172.30.0.0 network 172.30.0.0 no auto-summary no auto-summary ip classless ip classless ip http server ip http server ip http authentication local ip http authentication local line vty 0 4 line vty 0 4 password cisco password cisco privilege level 15 privilege level 15 transport input telnet ssh transport input telnet ssh login local login local end end

Perimeter Router RBB hostname RBB logging console enable password cisco username sdm privilege 15 password 0 sdm no ip domain-lookup interface Loopback0 description inside ip address 172.26.26.150 255.255.255.255 interface FastEthernet0/0 description TO_ROUTER_1 ip address 172.30.1.1 255.255.255.0 interface FastEthernet0/1 description TO_ROUTER_2 ip address 172.30.2.1 255.255.255.0 router eigrp 1 network 10.0.0.0 network 172.30.0.0 no auto-summary ip classless ip http server ip http authentication local line vty 0 4 password cisco privilege level 15 transport input telnet ssh login local end c. Verify the router configuration and save it to flash. RouterP#show run RouterP#copy run start

Test Connectivity a. Verify that the router interfaces are up. RouterP> show ip interface brief b. Verify the routes. RouterP> show ip route c. From the router, ping the outside interface of the peer router. RouterP> ping 172.30.Q.2 d. From the PC, ping RBB and the Backbone Server. C:\ ping 172.26.26.150 and C:\ ping 172.26.26.50 e. From the Student PC, ping the Inside Server. C:\ ping 10.0.P.10