6/9/2020 Ccna 2 Packet Tracer 10.4.1.1
Question: This Is Packet Tracer 10.4.1.1 On Netacad. Trying To Find The Commands I Need To Type On Each Device In Order To Acomplish This. I've Already. 2.4.1.4 Packet Tracer – Troubleshooting PPP with Authentication Packet Tracer – Troubleshooting PPP with Authentication (Answer Version) Answer Note: Red font color or Gray highlights indicate text that appears in the Answer copy only. Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 10.0.0.1 255.255.255.128 N/A S0/0/0 172.16.0.1 255.255.255.252 N/A.
Earlier, the downloading of the packet tracer was restricted. Only students who were enrolled in Cisco Academy courses were allowed to download the packet tracer.
This policy was later changed. Now, anyone can download the packet tracer from Cisco’s official site.The official site of Cisco offers only the most recent versions of Packet Tracer for downloading. You cannot download older versions of the packet tracer from there.
The packet tracer is improved in each version, a practice lab created in one version may or may not work in another version. Once the desired version of the packet tracer is downloaded, you can use the following tutorials to learn how to install it on Windows and Linux.This tutorial explains how to install Cisco Packet Tracer step-by-step on Windows.This tutorial explains how to install Cisco Packet Tracer on Ubuntu Linux and how to run it from a user's home directory. A brief introduction of the packet tracerPacket Tracer is a network simulator software. It simulates networking devices that are used to build CCNA practice labs. An average CCNA lab costs more than $300. A packet tracer cuts this cost by simulating all essential CCNA lab devices.A simulation-based learning environment helps students and instructors. Students can learn how to configure routers and switches from the command line.
Packet Tracer provides visual drag-and-drop problems using virtual networking devices. Instructors can create their own self-evaluated assignments for students or use it to demonstrate networking concepts.Since Packet Tracer was developed for the CCNA practice lab, it uses small and simplified versions of IOS. If some commands do not work in the packet tracer but work in a real device or work in some advance simulator software such as GNS3, it simply means that those commands are not included in the simplified version of IOS.Networking devices available in the packet tracer contain only essential commands and features.
If you are preparing for a CCNA level exam, then you do not have to worry about the remaining commands and features. For CCNA level exams, commands and features available in the packet tracer are sufficient.That’s all for this article. If you have any problem in downloading with any version of the packet tracer from this article, please let us know. If you like this article, don't forget to share it with friends through your favorite social network.
Objectives Enable IOS IPS. Configure logging.
Modify an IPS signature. Verify IPS.Background / ScenarioYour task is to enable IPS on R1 to scan traffic entering the 192.168.1.0 network.The server labeled Syslog is used to log IPS messages.
You must configure the router to identify the syslog server to receive logging messages. Displaying the correct time and date in syslog messages is vital when using syslog to monitor the network. Set the clock and configure the timestamp service for logging on the routers. Finally, enable IPS to produce an alert and drop ICMP echo reply packets inline.The server and PCs have been preconfigured. The routers have also been preconfigured with the following:o Enable password: ciscoenpa55o Console password: ciscoconpa55o SSH username and password: SSHadmin / ciscosshpa55o OSPF 101Part 1: Enable IOS IPSNote: Within Packet Tracer, the routers already have the signature files imported and in place.
They are the default xml files in flash. For this reason, it is not necessary to configure the public crypto key and complete a manual import of the signature files.Step 1: Enable the Security Technology package.a. On R1, issue the show version command to view the Technology Package license information.b. If the Security Technology package has not been enabled, use the following command to enable the package.R1(config)# license boot module c1900 technology-package securityk9c.
Accept the end user license agreement.d. Save the running-config and reload the router to enable the security license.e. Verify that the Security Technology package has been enabled by using the show version command.Step 2: Verify network connectivity.a. Ping from PC-C to PC-A. The ping should be successful.b. Ping from PC-A to PC-C. The ping should be successful.Step 3: Create an IOS IPS configuration directory in flash.On R1, create a directory in flash using the mkdir command.
Name the directory ipsdir.Step 4: Configure the IPS signature storage location.On R1, configure the IPS signature storage location to be the directory you just created.Step 5: Create an IPS rule.On R1, create an IPS rule name using the ip ips name name command in global configuration mode. Name the IPS rule iosips.Step 6: Enable logging.IOS IPS supports the use of syslog to send event notification. Syslog notification is enabled by default. If logging console is enabled, IPS syslog messages display.a. Enable syslog if it is not enabled.b. If necessary, use the clock set command from privileged EXEC mode to reset the clock.c.
Verify that the timestamp service for logging is enabled on the router using the show run command. Enable the timestamp service if it is not enabled.d. Send log messages to the syslog server at IP address 192.168.1.50.Step 7: Configure IOS IPS to use the signature categories.Retire the all signature category with the retired true command (all signatures within the signature release).
Unretire the IOSIPS Basic category with the retired false command.Step 8: Apply the IPS rule to an interface.Apply the IPS rule to an interface with the ip ips name direction command in interface configuration mode. Apply the rule outbound on the G0/1 interface of R1. After you enable IPS, some log messages will be sent to the console line indicating that the IPS engines are being initialized.Note: The direction in means that IPS inspects only traffic going into the interface.
Similarly, out means that IPS inspects only traffic going out of the interface.Part 2: Modify the SignatureStep 1: Change the event-action of a signature.Un-retire the echo request signature (signature 2004, subsig ID 0), enable it, and change the signature action to alert and drop.Step 2: Use show commands to verify IPS.Use the show ip ips all command to view the IPS configuration status summary.To which interfaces and in which direction is the iosips rule applied?Step 3: Verify that IPS is working properly.a. From PC-C, attempt to ping PC-A. Were the pings successful?
From PC-A, attempt to ping PC-C. Were the pings successful? Explain.Step 4: View the syslog messages.a.
Click the Syslog server.b. Select the Services tab.c. In the left navigation menu, select SYSLOG to view the log file.Step 5: Check results.Your completion percentage should be 100%. Packet Tracer – Skills Integration ChallengeAddressing TableScenarioThis activity includes many of the skills that you have acquired during your CCNA studies.
First, you will complete the documentation for the network. Make sure you have a printed version of the instructions. During implementation, you will configure VLANs, trunking, port security and SSH remote access on a switch. Then, you will implement inter-VLAN routing and NAT on a router. Finally, you will use your documentation to verify your implementation by testing end-to-end connectivity.DocumentationYou are required to fully document the network.
You will need a print out of this instruction set, which will include an unlabeled topology diagram: Label all the device names, network addresses and other important information that Packet Tracer generated. Complete the Addressing Table and VLANs and Port Assignments Table.
Fill in any blanks in the Implementation and Verification steps. Packet Tracer - Skills Integration ChallengeAddressing TableObjectives Configure basic router security Configure basic switch security Configure AAA local authentication Configure SSH Secure against login attacks Configure site-to-site IPsec VPNs Configure firewall and IPS settings Configure ASA basic security and firewall settingsScenarioThis culminating activity includes many of the skills that you have acquired during this course. The routers and switches are preconfigured with the basic device settings, such as IP addressing and routing.
You will secure routers using the CLI to configure various IOS features, including AAA, SSH, and Zone-Based Policy Firewall (ZPF). You will configure a site-to-site VPN between R1 and R3. You will secure the switches on the network. In addition, you will also configure firewall functionality on the ASA.RequirementsNote: Not all security features will be configur. Packet Tracer - Configure AAA Authentication on Cisco RoutersAddressing TableObjectives Configure a local user account on R1 and configure authenticate on the console and vty lines using local AAA. Verify local AAA authentication from the R1 console and the PC-A client. Configure server-based AAA authentication using TACACS+.
Verify server-based AAA authentication from the PC-B client. Configure server-based AAA authentication using RADIUS. Verify server-based AAA authentication from the PC-C client.Background / ScenarioThe network topology shows routers R1, R2 and R3. Currently, all administrative security is based on knowledge of the enable secret password. Your task is to configure and test local and server-based AAA solutions.You will create a local user account and configure local AAA on router R1 to test the console and vty logins.o User account: Admin1 and password admin1pa55You will then configure router R2.
Comments are closed.
|
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |