Lab b Standard ACLs Instructor Version 2500

Similar documents
Lab VTY Restriction Instructor Version 2500

Lab Configuring IGRP Instructor Version 2500

Lab Configuring Static Routes Instructor Version 2500

Lab Troubleshooting IP Address Issues Instructor Version 2500

Lab Backing up Configuration Files Instructor Version 2500

Lab Troubleshooting Routing Issues with show ip route and show ip protocols Instructor Version 2500

Lab Establishing and Verifying a Telnet Connection Instructor Version 2500

Lab Troubleshooting RIP

Lab Configuring a Serial Interface

Lab Troubleshooting Routing Issues with debug Instructor Version 2500

Lab Verifying RIP v2 Configuration

Lab Backing up Configuration Files

Lab b Simple DMZ Extended Access Lists Instructor Version 2500

Lab Advanced Telnet Operations Instructor Version 2500

Lab b Simple Extended Access Lists

Lab Well-Known Port Numbers and Multiple Sessions

Lab Command Modes and Router Identification. Objective. Background/Preparation. Step 1 Login to the router in user EXEC mode

Lab Configuring Router Passwords. Objective. Background/Preparation. Step 1 Login to the router in user EXEC mode

Lab Configuring OSPF Timers

Lab 4.2.5a Connectivity Tests Ping

Lab Troubleshooting Using traceroute Instructor Version 2500

Lab Using the Boot System Command. Objective. Background/Preparation

Lab Configuring OSPF Timers 2500 Series

This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and

Lab Configuring and Verifying Standard IPv4 ACLs (Instructor Version Optional Lab)

Lab Configuring and Verifying Standard IPv4 ACLs Topology

Lab Configuring the OSPF Routing Process

Backup a copy of a router IOS from flash to a TFTP server. Reload the backup IOS software image from a TFTP server into flash on a router.

Lab 1.1.4c Configuring Static NAT Addresses

Lab Verifying PPP Configuration

Lab Configuring and Verifying Standard ACLs Topology

Lab - Troubleshooting Standard IPv4 ACL Configuration and Placement Topology

Lab Modifying OSPF Cost Metric

Lab Configuring OSPF Authentication

Lab 1.1.4a Configuring NAT

Lab Configuring ISDN BRI (U-Interface)

Lab - Troubleshooting ACL Configuration and Placement Topology

Lab Configuring DHCP

Lab Verifying NAT and PAT Configuration

Lab Configuring OSPF Authentication 2500 Series

Lab Configuring Legacy DDR

Lab Managing IOS Images with TFTP Instructor Version 2500

Lab Correcting RIPv2 Routing Problems

Lab c Simple DMZ Extended Access Lists

Lab b Simple DMZ Extended Access Lists

Lab Configuring Legacy DDR

Lab Configuring Dialer Profiles

Lab Configuring Basic RIPv2 (Solution)

Lab Configuring and Verifying Extended ACLs Topology

Lab Managing Router Configuration Files with Terminal Emulation Software

Lab Configuring Dynamic and Static NAT (Solution)

Lab Configuring Dynamic and Static NAT (Instructor Version Optional Lab)

Lab : Challenge OSPF Configuration Lab. Topology Diagram. Addressing Table. Default Gateway. Device Interface IP Address Subnet Mask

Lab Troubleshooting IPv4 and IPv6 Static Routes (Instructor Version Optional Lab)

Lab: RIP v2 with VLSM

Lab Configuring Port Address Translation (PAT) (Instructor Version)

Lab 9.6.2: Challenge EIGRP Configuration Lab

Lab Designing and Implementing a VLSM Addressing Scheme. Topology. Objectives. Background / Scenario

Lab 9.1.5a Trunking with ISL 2924XL Series

Lab - Building a Switch and Router Network

CIS 83 LAB 3 - EIGRP Rich Simms September 23, Objective. Scenario. Topology

Lab Troubleshooting Basic PPP with Authentication Topology

Lab Configuring Basic Switch Settings (Solution)

Lab Using the CLI to Gather Network Device Information Topology

Lab 5.6.2: Challenge RIP Configuration

Case Study 2: Frame Relay and OSPF Solution

This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and

Lab Configuring 802.1Q Trunk-Based Inter-VLAN Routing (Instructor Version Optional Lab)

Lab Configuring Per-Interface Inter-VLAN Routing (Solution)

WCCPv2 and WCCP Enhancements

Lab - Troubleshooting VLAN Configurations (Instructor Version Optional Lab)

Lab Configuring Per-Interface Inter-VLAN Routing (Instructor Version)

Lab Router Configuration Using Setup Instructor Version 2500

CCNA 1 Chapter 2 v5.0 Exam Answers %

Skills Assessment Student Training

Lab 8.5.2: Troubleshooting Enterprise Networks 2

Lab 5.2.6b Managing IOS Images with ROMmon and Xmodem Instructor Version 2500

Lab Catalyst 2950T and 3550 Series Basic Setup

Lab Managing the MAC Address Table 2900XL Series

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Lab 1. CLI Navigation. Scenario. Initial Configuration for R1

Lab Capturing and Analyzing Network Traffic

1.4.1 Introductory Lab 1: Getting Started and Building Start.TXT

IPsec Anti-Replay Window Expanding and Disabling

Configuring Dynamic Multipoint VPN Using GRE Over IPsec With OSPF, NAT, and Cisco IOS Firewall

Lab - Configuring Basic DHCPv4 on a Router (Solution)

cable modem dhcp proxy nat on Cisco Cable Modems

Lab Configuring Switch Security Features Topology

Cisco Press CCIE Practical Studies CCIE Practice Lab: Enchilada Solutions

1. Which OSI layers offers reliable, connection-oriented data communication services?

Using Setup Mode to Configure a Cisco Networking Device

CCNA 1 Chapter 2 v5.0 Exam Answers 2013

Chapter 10 Lab 10-2, Securing VLANs INSTRUCTOR VERSION

Skills Assessment Student Training Exam

CCNA Semester 2 labs. Labs for chapters 2 10

Lab - Configuring IPv6 Addresses on Network Devices

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Antonio Cianfrani. Access Control List (ACL) Part I

Device Interface IP Address Subnet Mask Default Gateway

Lab Command Line Fundamentals Instructor Version 2500

Transcription:

Lab 11.2.1b Standard ACLs Instructor Version 2500 Objective Scenario Plan, configure, and apply a standard ACL to permit or deny specific traffic and test the ACL to determine if the desired results were achieved. The company home office in Gadsden (GAD) provides services to branch offices such as the Birmingham (BHM) office. These offices have some minor security and performance concerns. A Standard ACL needs to be implemented as a simple and effective tool to control traffic 340-833 CCNA 2: Routers and Routing Basics v 3.1 - Lab 11.2.1b Copyright 2003, Cisco Systems, Inc.

Infrastructure Host #3 represents the kiosk station that needs to have its access limited to the local network. Host #4 represents another host in the BHM office and the Loopback 0 interface on the GAD router represents the Internet. Step 1 Basic Router Interconnection a. Interconnect the routers as shown in the diagram. Step 2 Basic Configuration a. The router may contain configurations from a previous use. For this reason, erase the startup configuration and reload the router to remove any residual configurations. Refer to the table on the first page and setup the router and host configurations. Verify reachability by pinging all systems and routers from each system. b. To simulate the Internet, add the following configuration to the GAD router. GAD(config)#interface loopback0 GAD(config-if)#address 172.16.1.1 255.255.255.0 GAD(config-if)#exit GAD(config)#router rip GAD(config-router)#network 172.16.0.0 GAD(config-if)#^z Step 3 Establish Access List Requirements a. The kiosk station (host 3) needs to have its access limited to the local network. It is determined that a standard access list needs to be created to prevent traffic from this host from reaching any other networks. The access control list should block traffic from this host and not affect other traffic from this network. A standard IP ACL satisfies this requirement as it filters based on the source address to any destination. What source address of the kiosk? 192.168.3.2 Step 4 Plan the Access List Requirements a. As with any project, the most important part of the process is the planning. First, define the information needed to create the ACL. Remember that statements are added sequentially to an ACL. Therefore, the order of the statements needs to be planned carefully. b. It has been determined that this ACL will require 2 logical steps. Each of these steps can be accomplished with one statement each. As a planning tool, a text editor like Notepad can be used to organize the logic and then write the list. In the text editor enter the logic by typing: stop traffic from host 3 permit all other traffic 341-833 CCNA 2: Routers and Routing Basics v 3.1 - Lab 11.2.1b Copyright 2003, Cisco Systems, Inc.

c. From this logic the actual ACL will be written. Using the tables below, document the information for each statement. stop traffic from host 3 List # permit or deny Source address Wildcard mask 1 Deny 192.168.3.2 0.0.0.0 permit all other traffic List # permit or deny Source address Wildcard mask 1 Permit 0.0.0.0 255.255.255.255 d. What would be the result of not including a statement to permit all other source addresses? Every packet going into that interface would be denied due to the implicit deny any any statement. e. What would be the result of reversing the order of the 2 statements in the list? The ACL tests packets in the order in which the ACL was written. Therefore, if the packet is sent past the permit any any statement first, the deny statement does not take place. f. Why are both statements using the same ACL number? They are both part of the incoming ACL. And since there are only two ACLs allowed per interface, the statements must be listed with each other in the same ACL. g. The final step in the planning process is to determine the best location for the access list and the direction the list should be applied. Examine the internetwork diagram and choose the appropriate interface and direction. Document this in the table below: Router Interface Direction BHM E0 in* Note:* This may also be applied to S0 out to stop traffic to the GAD. Step 5 Write and Apply the ACL a. Using the previously constructed logic and information of the access list, complete the commands in the text editor. The list syntax should look similar to: stop traffic from host 3 access-list # deny address wildcard permit all other traffic access-list # permit address wildcard b. Add to this text file the configuration statements to apply the list. The configuration statements take the form of: interface type #/# ip access-group # {in, out} 342-833 CCNA 2: Routers and Routing Basics v 3.1 - Lab 11.2.1b Copyright 2003, Cisco Systems, Inc.

c. Now the text file configuration needs to be applied to the router. Enter the configuration mode on the appropriate router and copy and paste the configuration. Observe the CLI display to ensure no errors were encountered. Step 6 Verify the ACL Now that the ACL is completed, the ACL needs to be confirmed and tested. a. The first step is to check the list to see if it was configured properly on the router. To check the ACL logic use the show access-lists command. Record the output. BHM#show ip access-lists Standard IP access list 1 deny 192.168.3.2 permit any b. Next, verify that the access list was applied to the proper interface and in the correct direction. To do this examine the interface with the show ip interface command. Look at the output from each interface and record the lists applied to the interface. Interface E0 Outgoing access list is not set Inbound access list is 1 Ethernet0 is up, line protocol is up Internet address is 192.168.3.1/24 Broadcast address is 255.255.255.255 Address determined by setup command MTU is 1500 bytes Helper address is not set Directed broadcast forwarding is disabled Multicast reserved groups joined: 224.0.0.9 Outgoing access list is not set Inbound access list is 1 <output omitted> c. Finally, test the functionality of the ACL by trying to send packets from the source host and verify that is to be permitted or denied as appropriate. In this case, ping will be used to test this. [ x ] verify that host 3 CAN ping host 4 [ x ] verify that host 3 CANNOT ping host 1 [ x ] verify that host 3 CANNOT ping host 2 [ x ] verify that host 3 CANNOT ping GAD Fa0/0E0 [ x ] verify that host 3 CANNOT ping GAD LO0 [ x ] verify that host 4 CAN ping host 1 [ x ] verify that host 4 CAN ping host 2 [ x ] verify that host 4 CAN ping GAD Fa0/0E0 [ x ] verify that host 4 CAN ping GAD LO0 Step 7 Document the ACL a. As a part of all network management, documentation needs to be created. Using the text file created for the configuration, add additional comments. This file should also contain output from the show access-lists and the show ip interface commands. b. The file should be saved with other network documentation. The file naming convention should reflect the function of the file and the date of implementation. 343-833 CCNA 2: Routers and Routing Basics v 3.1 - Lab 11.2.1b Copyright 2003, Cisco Systems, Inc.

That should complete the ACL project. This is to stop access from the kiosk and is applied to Fa0 in access-list 1 deny 192.168.3.2 access-list 1 permit any interface Ethernet0 ip access-group 1 in access list applied to stop kiosk traffic Ethernet0 is up, line protocol is up Internet address is 192.168.3.1/24 Broadcast address is 255.255.255.255 Address determined by setup command MTU is 1500 bytes Helper address is not set Directed broadcast forwarding is disabled Multicast reserved groups joined: 224.0.0.9 Outgoing access list is not set Inbound access list is 1 <output omitted> BHM#show ip access-lists Standard IP access list 1 deny 192.168.3.2 permit any c. Once finished, erase the start-up configuration on routers, remove and store the cables and adapter. Also logoff and turn the router off. 344-833 CCNA 2: Routers and Routing Basics v 3.1 - Lab 11.2.1b Copyright 2003, Cisco Systems, Inc.

Erasing and reloading the router Enter into the privileged EXEC mode by typing enable. If prompted for a password, enter class. If class does not work, ask the instructor for assistance. Router>enable At the privileged EXEC mode, enter the command erase startup-config. Router#erase startup-config The responding line prompt will be: Erasing the nvram filesystem will remove all files Continue? [confirm] Press Enter to confirm. The response should be: Erase of nvram: complete Now at the privileged EXEC mode, enter the command reload. Router#reload The responding line prompt will be: System configuration has been modified. Save? [yes/no]: Type n and then press Enter. The responding line prompt will be: Proceed with reload? [confirm] Press Enter to confirm. In the first line of the response will be: Reload requested by console. After the router has reloaded the line prompt will be: Would you like to enter the initial configuration dialog? [yes/no]: Type n and then press Enter. The responding line prompt will be: Press RETURN to get started Press Enter. The router is ready for the assigned lab to be performed. Router Interface Summary Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface #2 800 (806) Ethernet 0 (E0) Ethernet 1 (E1) 1600 Ethernet 0 (E0) Ethernet 1 (E1) Serial 0 (S0) Serial 1 (S1) 1700 FastEthernet 0 (FA0) FastEthernet 1 (FA1) Serial 0 (S0) Serial 1 (S1) 2500 Ethernet 0 (E0) Ethernet 1 (E1) Serial 0 (S0) Serial 1 (S1) 2600 FastEthernet 0/0 (FA0/0) FastEthernet 0/1 (FA0/1) Serial 0/0 (S0/0) Serial 0/1 (S0/1) Interface #5 345-833 CCNA 2: Routers and Routing Basics v 3.1 - Lab 11.2.1b Copyright 2003, Cisco Systems, Inc.

In order to find out exactly how the router is configured, look at the interfaces. This will identify the type of router as well as how many interfaces the router has. There is no way to effectively list all of the combinations of configurations for each router class. What is provided are the identifiers for the possible combinations of interfaces in the device. This interface chart does not include any other type of interface even though a specific router may contain one. An example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be used in IOS command to represent the interface. 346-833 CCNA 2: Routers and Routing Basics v 3.1 - Lab 11.2.1b Copyright 2003, Cisco Systems, Inc.

BHM#show running-config Building configuration... Current configuration: version 12.0 service timestamps debug uptime service timestamps log uptime no service password-encryption hostname BHM ip subnet-zero ip audit notify log ip audit po max-events 100 process-max-time 200 interface Ethernet0 ip address 192.168.3.1 255.255.255.0 ip access-group 1 in interface Serial0 ip address 192.168.2.2 255.255.255.0 no ip mroute-cache no fair-queue clockrate 64000 interface Serial1 no ip address shutdown router rip network 192.168.2.0 network 192.168.3.0 ip classless no ip http server access-list 1 deny 192.168.3.2 access-list 1 permit any line con 0 transport input none line aux 0 line vty 0 4 no scheduler allocate end 347-833 CCNA 2: Routers and Routing Basics v 3.1 - Lab 11.2.1b Copyright 2003, Cisco Systems, Inc.

GAD#show running-config Building configuration... Current configuration: version 12.0 service timestamps debug uptime service timestamps log uptime no service password-encryption hostname GAD memory-size iomem 10 ip subnet-zero ip audit notify log ip audit po max-events 100 process-max-time 200 interface Loopback0 ip address 172.16.1.1 255.255.255.0 interface Ethernet0 ip address 192.168.1.1 255.255.255.0 interface Serial0 ip address 192.168.2.1 255.255.255.0 no ip mroute-cache no fair-queue interface Serial1 no ip address shutdown router rip network 172.16.0.0 network 192.168.1.0 network 192.168.2.0 ip classless no ip http server line con 0 transport input none line aux 0 line vty 0 4 no scheduler allocate end 348-833 CCNA 2: Routers and Routing Basics v 3.1 - Lab 11.2.1b Copyright 2003, Cisco Systems, Inc.

Lab 11.2.1b Standard ACLs Instructor Version 2600 Objective Scenario Plan, configure, and apply a standard ACL to permit or deny specific traffic and test the ACL to determine if the desired results were achieved. The company home office in Gadsden (GAD) provides services to branch offices such as the Birmingham (BHM) office. These offices have some minor security and performance concerns. A Standard ACL needs to be implemented as a simple and effective tool to control traffic 762-833 CCNA 2: Routers and Routing Basics v 3.1 - Lab 11.2.1b Copyright 2003, Cisco Systems, Inc.

Infrastructure Host #3 represents the kiosk station that needs to have its access limited to the local network. Host #4 represents another host in the BHM office and the Loopback 0 interface on the GAD router represents the Internet. Step 1 Basic Router Interconnection a. Interconnect the routers as shown in the diagram. Step 2 Basic Configuration a. The router may contain configurations from a previous use. For this reason, erase the startup configuration and reload the router to remove any residual configurations. Refer to the table on the first page and setup the router and host configurations. Verify reachability by pinging all systems and routers from each system. b. To simulate the Internet, add the following configuration to the GAD router. GAD(config)#interface loopback0 GAD(config-if)#address 172.16.1.1 255.255.255.0 GAD(config-if)#exit GAD(config)#router rip GAD(config-router)#network 172.16.0.0 GAD(config-if)#^z Step 3 Establish Access List Requirements a. The kiosk station (host 3) needs to have its access limited to the local network. It is determined that a standard access list needs to be created to prevent traffic from this host from reaching any other networks. The access control list should block traffic from this host and not affect other traffic from this network. A standard IP ACL satisfies this requirement as it filters based on the source address to any destination. What source address of the kiosk? 192.168.3.2 Step 4 Plan the Access List Requirements a. As with any project, the most important part of the process is the planning. First, define the information needed to create the ACL. Remember that statements are added sequentially to an ACL. Therefore, the order of the statements needs to be planned carefully. b. It has been determined that this ACL will require 2 logical steps. Each of these steps can be accomplished with one statement each. As a planning tool, a text editor like Notepad can be used to organize the logic and then write the list. In the text editor enter the logic by typing: stop traffic from host 3 permit all other traffic 763-833 CCNA 2: Routers and Routing Basics v 3.1 - Lab 11.2.1b Copyright 2003, Cisco Systems, Inc.

c. From this logic the actual ACL will be written. Using the tables below, document the information for each statement. stop traffic from host 3 List # permit or deny Source address Wildcard mask 1 Deny 192.168.3.2 0.0.0.0 permit all other traffic List # permit or deny Source address Wildcard mask 1 Permit 0.0.0.0 255.255.255.255 d. What would be the result of not including a statement to permit all other source addresses? Every packet going into that interface would be denied due to the implicit deny any any statement. e. What would be the result of reversing the order of the 2 statements in the list? The ACL tests packets in the order in which the ACL was written. Therefore, if the packet is sent past the permit any any statement first, the deny statement does not take place. f. Why are both statements using the same ACL number? They are both part of the incoming ACL. Since there are only two ACLs allowed per interface, the statements must be listed with each other in the same ACL. g. The final step in the planning process is to determine the best location for the access list and the direction the list should be applied. Examine the internetwork diagram and choose the appropriate interface and direction. Document this in the table below: Router Interface Direction BHM FA0/0 in* Note: * This may also be applied to S0 out to stop traffic to GAD. Step 5 Write and Apply the ACL a. Using the previously constructed logic and information of the access list, complete the commands in the text editor. The list syntax should look similar to: stop traffic from host 3 access-list # deny address wildcard permit all other traffic access-list # permit address wildcard b. Add to this text file the configuration statements to apply the list. The configuration statements take the form of: interface type #/# ip access-group # {in, out} 764-833 CCNA 2: Routers and Routing Basics v 3.1 - Lab 11.2.1b Copyright 2003, Cisco Systems, Inc.

c. Now the text file configuration needs to be applied to the router. Enter the configuration mode on the appropriate router and copy and paste the configuration. Observe the CLI display to ensure no errors were encountered. Step 6 Verify the ACL Now that the ACL is completed, the ACL needs to be confirmed and tested. a. The first step is to check the list to see if it was configured properly on the router. To check the ACL logic use the show access-lists command. Record the output. BHM#show ip access-lists Standard IP access list 1 deny 192.168.3.2 permit any b. Next, verify that the access list was applied to the proper interface and in the correct direction. To do this examine the interface with the show ip interface command. Look at the output from each interface and record the lists applied to the interface. Interface FA0/0 Outgoing access list is not set Inbound access list is 1 FastEthernet0/0 is up, line protocol is up Internet address is 192.168.3.1/24 Broadcast address is 255.255.255.255 Address determined by setup command MTU is 1500 bytes Helper address is not set Directed broadcast forwarding is disabled Multicast reserved groups joined: 224.0.0.9 Outgoing access list is not set Inbound access list is 1 <output omitted> c. Finally, test the functionality of the ACL by trying to send packets from the source host and verify that is to be permitted or denied as appropriate. In this case, ping will be used to test this. [ x ] verify that host 3 CAN ping host 4 [ x ] verify that host 3 CANNOT ping host 1 [ x ] verify that host 3 CANNOT ping host 2 [ x ] verify that host 3 CANNOT ping GAD Fa0/0 [ x ] verify that host 3 CANNOT ping GAD LO0 [ x ] verify that host 4 CAN ping host 1 [ x ] verify that host 4 CAN ping host 2 [ x ] verify that host 4 CAN ping GAD Fa0/0 [ x ] verify that host 4 CAN ping GAD LO0 Step 7 Document the ACL a. As a part of all network management, documentation needs to be created. Using the text file created for the configuration, add additional comments. This file should also contain output from the show access-lists and the show ip interface commands. b. The file should be saved with other network documentation. The file naming convention should reflect the function of the file and the date of implementation. 765-833 CCNA 2: Routers and Routing Basics v 3.1 - Lab 11.2.1b Copyright 2003, Cisco Systems, Inc.

That should complete the ACL project. This is to stop access from the kiosk and is applied to Fa0 in access-list 1 deny 192.168.3.2 access-list 1 permit any interface FastEthernet0/0 ip access-group 1 in access list applied to stop kiosk traffic FastEthernet0/0 is up, line protocol is up Internet address is 192.168.3.1/24 Broadcast address is 255.255.255.255 Address determined by setup command MTU is 1500 bytes Helper address is not set Directed broadcast forwarding is disabled Multicast reserved groups joined: 224.0.0.9 Outgoing access list is not set Inbound access list is 1 <output omitted> BHM#show ip access-lists Standard IP access list 1 deny 192.168.3.2 permit any c. Once finished, erase the start-up configuration on routers, remove and store the cables and adapter. Also logoff and turn the router off. 766-833 CCNA 2: Routers and Routing Basics v 3.1 - Lab 11.2.1b Copyright 2003, Cisco Systems, Inc.

BHM#show running-config Building configuration... Current configuration: version 12.0 service timestamps debug uptime service timestamps log uptime no service password-encryption hostname BHM ip subnet-zero ip audit notify log ip audit po max-events 100 process-max-time 200 interface FastEthernet0/0 ip address 192.168.3.1 255.255.255.0 ip access-group 1 in interface Serial0/0 ip address 192.168.2.2 255.255.255.0 no ip mroute-cache no fair-queue clockrate 64000 interface Serial0/1 no ip address shutdown router rip network 192.168.2.0 network 192.168.3.0 ip classless no ip http server access-list 1 deny 192.168.3.2 access-list 1 permit any line con 0 transport input none line aux 0 line vty 0 4 no scheduler allocate end 767-833 CCNA 2: Routers and Routing Basics v 3.1 - Lab 11.2.1b Copyright 2003, Cisco Systems, Inc.

GAD#show running-config Building configuration... Current configuration: version 12.0 service timestamps debug uptime service timestamps log uptime no service password-encryption hostname GAD memory-size iomem 10 ip subnet-zero ip audit notify log ip audit po max-events 100 process-max-time 200 interface Loopback0 ip address 172.16.1.1 255.255.255.0 interface FastEthernet0/0 ip address 192.168.1.1 255.255.255.0 interface Serial0/0 ip address 192.168.2.1 255.255.255.0 no ip mroute-cache no fair-queue interface Serial0/1 no ip address shutdown router rip network 172.16.0.0 network 192.168.1.0 network 192.168.2.0 ip classless no ip http server line con 0 transport input none line aux 0 line vty 0 4 no scheduler allocate end 768-833 CCNA 2: Routers and Routing Basics v 3.1 - Lab 11.2.1b Copyright 2003, Cisco Systems, Inc.