1. A network engineer has decided to pilot test a portion of a new network design rather than rely on a prototype for proof-of-concept. What are two advantages of pilot testing a design concept?(Choose two.)
• The test network experiences real-world network traffic.
• Users within the enterprise are not affected by the test.
• Network response can be tested in unplanned and unpredictable situations.
• Unlikely failure conditions can be conveniently tested.
• Network response can be tested in a highly controlled simulated environment.
2. While preparing a network test plan document, a network designer records all initial and modified device configurations. Which section of the document typically contains this information?
• Appendix
• Test Procedures
• Test Description
• Actual Results and Conclusions
• Anticipated Results and Success Criteria
3. Refer to the exhibit. A network designer creates a test plan that includes the specification shown. In which section of the test plan would this specification be found?
• Test Description
• Test Procedures
• Design and Topology Diagram
• Actual Results and Conclusions
• Anticipated Results and Success Criteria
4. What OSI model Layer 2 security measure can a network engineer implement when prototyping network security?
• a firewall at the network edge
• port security at the access design layer
• port security at the distribution design layer
• IP access control lists at the access design layer
5. How do designers decide which network functions need to be included in the prototype test?
• They select the functions that align with the business goals.
• They select the functions that occur at the network core.
• They select the functions that do not exist in the existing network.
• They select the functions from a list of generic network operations.
6. Refer to the exhibit. During prototype testing of the Cisco network shown, connectivity must be verified. Assuming all connections are working and CDP is enabled on all devices and interfaces, on which device was the command issued?
• R1
• S1
• R3
• S2
• R5
• S3
7. Refer to the exhibit. During prototyping, Layer 2 functionality is being tested. Based on the output shown, which two pieces of information can be determined? (Choose two.)
• Switch1 is the root bridge.
• Interface Fa0/2 on Switch1 has no role in the operation of spanning tree.
• Interface Fa0/2 on Switch1 is the alternate port used to reach the root bridge.
• Based on the entries in the "Role" column, it can be concluded that RSTP has been implemented.
• Interface Fa0/1 on Switch1 is the forwarding port selected for the entire spanning-tree topology.
8. What Rapid Spanning Tree Protocol (RSTP) state is given to the forwarding port elected for every switched Ethernet LAN segment?
• root
• backup
• alternate
• designated
9. Refer to the exhibit. During prototype testing, verification of VLAN connectivity is being performed. Based on the information shown, what command produced the output?
• show spanning-tree
• show interfaces trunk
• show cdp neighbors
• show interfaces
• show ip interface brief
10. Switch port Fa0/24 was previously configured as a trunk, but now it is to be used to connect a host to the network. How should the network administrator reconfigure switch port Fa0/24?
• Use the switchport mode access command from interface configuration mode.
• Enter the switchport nonegotiate command from interface configuration mode.
• Administratively shut down and re-enable the interface to return it to the default.
• Enter the no switchport mode trunk command in interface configuration mode.
• Use the switchport access vlan vlan number command from interface configuration mode
• to remove the port from the trunk and add it to a specific VLAN.
11. Refer to the exhibit. The redundant paths are of equal bandwidth and EIGRP is the routing protocol in use. Which statement describes the data flow from Server to PC2?
• EIGRP load balances across the R3 to R1 and R3 to R2 links.
• EIGRP load balances across the R1 to Switch3 and R2 to Switch3 paths.
• EIGRP load balances across the Switch1 to Switch3 and Switch1 to Switch2 paths.
• EIGRP does not load balance in this topology.
12. A network designer needs to determine if a proposed IP addressing scheme allows efficient route summarization and provides the appropriate amount of scalability to a design. What is useful for validating a proposed hierarchical IP addressing scheme?
• NBAR
• a pilot network
• a route summary
• a network simulator
• a physical topology ma
13. In the router command encapsulation dot1q 10, what does the number 10 represent?
• the metric used for a particular route
• the number of the VLAN associated with the encapsulated subinterface
• the priority number given to the device for the election process
• the number that must match the Fast Ethernet subinterface number
• the number used to program the router for unequal cost path load balancing
14. Refer to the exhibit. The users on the 192.168.10.192 network are not allowed Internet access. The network design calls for an extended ACL to be developed and tested. Where should the ACL be placed for the least effect on other network traffic?
• inbound on Fa0/0 of R3
• outbound on Fa0/0 of R3
• inbound on Fa0/1 of R3
• outbound on Fa0/1 of R3
• inbound on Fa0/1 of R2
• outbound on S0/0 of R2
15. Refer to the exhibit. What two measures can be taken to address the areas of weakness circled in the network design? (Choose two.)
• Provide redundant connections to all end users.
• Add another core switch to increase redundancy.
• Add a switch in the server block connecting the server farm to each core switch.
• Add an additional switch to the DMZ and direct links from the new switch to the core switches.
• Provide a redundant firewall router connecting to a second ISP, the core switches, and the DMZ.
16. Why is it important to record baseline measurements of a prototype network?
• Test results show security weaknesses after the baseline tests are run.
• The baseline is the point at which the network is operating at its fullest potential.
• Baseline measurements define a point at which network traffic has exceeded the designed capabilities of the network.
• Test results are compared to the baseline to see how the test conditions increase processor use or decrease available bandwidth.
17. Refer to the exhibit. A network administrator has been given the task of creating a design for a temporary classroom building that is to be set up outside an overcrowded school. In testing the prototype, it is found that the student PC cannot ping the teacher PC. All the switch interfaces are active and connected properly, as is interface Fa0/0 of the router. Given that only the commands shown have bee added to the router configuration, what is the source of the problem?
• The IP settings on the student PC are incorrect.
• The default gateway on the teacher PC is misconfigured.
• The router Fa0/0 interface has not been configured as a VLAN trunk.
• The Fa0/0 physical interface has not been configured with an IP address and subnet mask.
• The administrator forgot to configure a routing protocol to allow the ping packets to reach the teacher PC subnet.
18. Refer to the exhibit. Why are interfaces Fa0/11, Fa0/23, and Fa0/24 not shown in this switch output?
• Interfaces Fa0/11, Fa0/23, and Fa0/24 are trunks.
• Interfaces Fa0/11, Fa0/23, and Fa0/24 are shutdown.
• Interfaces Fa0/11, Fa0/23, and Fa0/24 are blocking.
• Interfaces Fa0/11, Fa0/23, and Fa0/24 failed diagnostics
19. Refer to the exhibit. A network technician is performing an initial installation of a new switch in the east wing. The technician removes the switch from the box, makes the connections to the network, and adds the configuration shown. The technician notifies the network administrator that the switch has been installed. When the network administrator at the home office attempts to telnet to the switch from host 192.168.0.1, the connection fails. What action should the network technician take?
• Add an enable password to the switch.
• Add a default gateway to the switch configuration.
• Configure the switch with an IP access list to permit the host connection.
• Enable the physical interfaces of the switch with the no shutdown command.
20. Refer to the exhibit. After all the interfaces have stabilized, what is the spanning-tree state of all the enabled interfaces of SW11?
• discarding
• forwarding
• learning
• listening
1. Which two statements describe factors that influence the layout of a proposal? (Choose two.)
• Proposal layouts are required to use sans serif typefaces.
• A specific proposal layout is followed when one is specified in the RFP.
• A designer chooses the layout if a written RFP does not specify an outline.
• The software that is used to create the proposal dictates the proposal layouts.
• Proposal layouts are required to use a format that is designed by the network engineer.
2 . What two items are typically included in the executive summary of a proposal? (Choose two.)
• project scope summary
• high-level implementation plan
• quotes for all needed equipment
• technical requirements for the design
• emphasis on the benefits that meet the goals of the customer
3. Which proposal section describes the intended routing protocol, security mechanisms, and addressing for the planned network?
• logical design
• physical design
• executive summary
• implementation plan
• network requirements
4. Which occurrence would indicate a failure of the design phase?
• The incorrect model switches were ordered.
• There is no customer signoff for task completion.
• New requirements are identified after implementation begins.
• The new network capacity is inadequate to support required traffic.
5. A network installation team is assigned to replace all core switches in an existing data center. No other upgrades are planned. Which kind of installation is this?
• a new installation
• a fork-lift installation
• a phased installation
• a green field installation
6. What service is provided Cisco standard warranty?
• software application maintenance
• replacement of defected hardware
• next business day delivery of replacement parts
• access to the Cisco Technical Assistance Center (TAC) 24 hours a day, 7 days a week
7. An upgraded version of the Cisco IOS has been purchased. However, the CD arrived damaged. How will this loss be covered?
• a hardware warranty
• a software warranty
• the Cisco SMARTnet Service
• an additional service contract
8. A company informs the account manager that the installation of a new edge router at the customer remote branch location cannot be done at the scheduled time because of a large order that the branch office needs to complete. As a result, the end date of the project must be adjusted to accommodate the additional time. What is the action should the account manager take?
• Cancel the order for the new edge router.
• Work with designer to redesign the branch network.
• Instruct the technician to complete the install of the router at on the date in the contract.
• Adjust the timeline documentation to show the company how the delay will affect the
• project completion date.
9. NetworkingCompany completes the installation of a network upgrade for a retail customer. All of the onsite tests complete successfully and the customer IT staff approves the results of the tests. The manager of the retail store contacts NetworkingCompany to inform the company that the store will not pay for the upgrade until a recently purchased software package is installed and tested on the network. Which two items that are contained in the proposal can the account manager refer to when discussing this issue with the store manager?(Choose two.)
• the project scope
• the bill-of-material
• the project timeline
• the terms and conditions
• the business goals of the customer
• the evaluation of the current network
10. The operation of a new branch location network is delayed because a VPN cannot be configured and established between the branch location and the main office. It is determined that the router at the main office does not have enough memory and does not have the correct Cisco IOS version image to support the VPN features. To prevent this delay, this problem should have been identified and corrected during which part of the design project?
• the preparation of the business case
• the prioritizing of the technical goals
• the characterization of the existing network
• the implementation of the approved design
11.The NetworkingCompany team is tasked to prepare an implementation schedule for a customer. It is determined that the new firewalls and wireless controllers that are specified in the design cannot be delivered and installed within the agreed upon time frame. The NetworkingCompany informs the customer of the problem. What two options can the NetworkingCompany team take to ensure the success of the project? (Choose two.)
• plan to add additional staff and resources to shorten the installation time after the new equipment is delivered
• eliminate redundancy in the design to reduce the amount of equipment that is needed
• renegotiate a new time frame with the customer to accommodate the delay
• delay the installation of the security devices and controllers until a later time
• redesign the network to use only readily available equipment and software
12. AAA Financial Services Company is performing implementation planning for a core switch upgrade. The company has 200 financial software programmers that work billable hours during the week. They have critical, scheduled money transfer transmissions that occur at hourly intervals every night. There are two, two-hour long IT maintenance windows scheduled for software upgrades, one on Saturday and one on Sunday. The bank advertises online banking as available 24 hours on business days and 21 hours on the weekends. However, a network upgrade that is necessary to replace some switches is expected to take four hours. Because of rack constraints, this time includes three hours to remove the old switches before the new switches can be installed and one hour to test the logical configuration. How should the implementation scheduling be handled
• Defer the software upgrades. Use the Saturday window to perform the hardware installation. Use the Sunday window to perform the logical testing.
• Coordinate and publish a separate four-hour downtime during Friday to perform the complete switch installation and testing process. Use the Saturday and Sunday windows to correct any outage problems after the Friday window.
• Coordinate and publish two, four-hour downtimes incorporating the published Saturday and Sunday windows. Defer any software upgrades until the new network is proven to be working
correctly with the old software. Use the Sunday window as a fallback scheduling period if there re problems necessitating backing out of the Saturday window.
• Coordinate and publish an eight-hour downtime incorporating the Saturday window. This ill allow four hours for installation and logical testing, one hour for troubleshooting and decision, and three hours to roll back to the previous configuration if the new switching cannot pass the logical testing. Defer any software upgrades until the new network is proven to be working orrectly with the old software.
13. ncluded in a Bill of Materials (BOM) for a SOHO wired implementation is a Cisco 2811 router, Catalyst 2560 switch, four PCs, three laptops, and a networked printer. Wireless LAN capability will be implemented on this network. Which two equipment types must be added to the BOM to implement this request? (Choose two.)
• DNS server
• LAN switch
• wireless NICs
• DHCP server
• wireless access points
14. A customer has just taken delivery of a Cisco 2811 router and Catalyst 3560 switch. Included with the purchase is the SMARTnet Service. Which two resources are included with SMARTnet Service? (Choose two.)
• signature file updates
• technical support from TAC
• maintenance releases for OS
• software application major releases
• software application maintenance and minor releases
15. A Cisco 1841 router has been purchased without an agreement for SMARTnet Service. What two items are guaranteed under the standard warranty? (Choose two.)
• access to TAC
• replacement of defective physical media
• advanced replacement of hardware parts
• access to a renewable standard warranty contract
• under normal use, replacement of defective hardware
16. Upon completion of a proposal, a network design team must sell their ideas to two key stakeholders. Who are these two stakeholders? (Choose two.)
• customers
• licensing boards
• cabling contractors
• internal management
• project implementation team
17. What are two important guidelines when creating a slide presentation for a meeting with a customer? (Choose two.)
• Use all capital letters on words and phrases when possible for added emphasis.
• Provide varied background graphics to enhance viewer interest.
• Use contrasting colors for background and text to aid visibility.
• Change fonts frequently to denote differences in subject matter.
• Use bulleted text to lead the discussion.
18. In order to finalize a project proposal, an account manager of a
• networking company creates the terms and conditions section. What are two clauses that should be included in this section? (Choose two.)
• cost summary
• installation steps
• change order procedures
• problem resolution process
• maintenance contract quotation
19. Which two items will a systems engineer include in an implementation plan? (Choose two.)
• references to design documents
• the business goals of the customer
• diagrams of the existing traffic flows
• the steps to install and test the network
• cost of each network device and component
20. Which statement describes a phased installation into an existing network?
• A phased installation generally takes less time and expense than a green-field installation.
• A phased installation is not suitable for large, multi-site network installations or upgrades.
• A phased installation requires detailed planning in order to avoid disruption of user services.
• A phased installation involves building an entire replacement network and migrating users over to it.
1. A network engineer researched whether there are mechanisms availableto help with the transition from an IPv4 addressing structure to IPv6.What three options did the engineer find?(Choose three.)
• A protocol translation mechanism allows communication between the IPv4 and IPv6 networks.
• A packet analyzer determines the addressing structure and converts it to the appropriate IPv4 or IPv6 scheme.
• New Core devices that support IPV6 must be purchased.
• A protocol converter changes IPv4 packets into IPv6 packets and vice versa.
• A dual-stack network design allows both IPv4 and IPv6 addressing to be used on all network devices.
• Tunneling allows IPv4 packets to be encapsulated so that they can traverse IPv6 networks and vice versa.
2. When should the command no auto-summary be used?
• with RIP version 1, to enable classless routing
• with RIP version 2, to enable classless routing
• with RIP version 1, when discontigous networks exist
• with RIP version 2, when discontigous networks exist
3.Refer to the exhibit. What must an administrator do on R3 to ensurethat update packets are sent with subnet mask information?
• Add the commands:
R3(config-router)# auto-summary
R3(config-router)# no version 2
• Add the commands:
R3(config-router)# version 2
R3(config-router)# no auto-summary
• Change the network statement on R3:
R3(config)# network 10.10.4.0
• Add the command:
R3(config)# ip route 0.0.0.0 0.0.0.0 s0/0
4. What best describes a discontiguous network?
• combines several classfull networking address
• contains more than one route to a destination
• implements more than one routing protocol
• separated from the rest of the hierarchical group by another network
5.Refer to the exhibit. A company has decided to add a new workgroup. Ifthe subnetting scheme for the network uses contiguous blocks ofaddresses, what subnet is assigned to WGROUP3?
• 172.16.3.12/29
• 172.16.3.16/29
• 172.16.3.20/29
• 172.16.3.24/29
• 172.16.3.32/29
6.A network administrator is using the 10.0.0.0/8 network for thecompany. The administrator must create a masking scheme to support 750users at the main office and 620 users at the remote office. What maskshould be assigned to the 10.0.0.0/8 network to preserve the mostaddresses?
• 255.255.255.0
• /19
• /20
• 255.255.252.0
• /23
• /21
7. What is another format for the IPv6 address 1080:0000:0000:0000:0000:0000:1267:01A2?
• 1080::1267:01A2
• 1080:0:0:0:0:1267:01A2
• 1080::0:1267:01A2
• 1080:::::1267.01A2
8. How many bits make up an IPv6 address?
• 32
• 48
• 64
• 128
9.After activating IPv6 traffic forwarding, configuring IPv6 addresses,and globally configure RIPng, what is the remaining step to activateRIPng?
• Enter the ipv6 router rip name command and then use network statements to activate RIPng on the interfaces.
•Enter the ipv6 router rip name command and then specify whichinterfaces run RIPng, which are passive, and which only receive.
• Enter the interface mode for each IPv6 interface and enable RIPng with the ipv6 rip name enable command.
•Enter the interface mode for each IPv6 interface and enable themulticast group FF02::9, and then activate RIPng globally using theipv6 router rip name command.
• Enter the router rip command, and then activate RIPng using the version command.
• RIPng then automatically runs on all IPv6 interfaces.
10.Refer to the exhibit. The IT management has determined that the newsubnet for WGROUP3 needs to be broken down into four more subnets. Whatwould the subnet mask be for the four newly created subnets withinWGROUP3?
• 255.255.128.0
• 255.255.192.0
• 255.255.224.0
• 255.255.248.0
• 255.255.252.0
11. Refer to the exhibit. What is the first usable IP address that can be assigned to the WGROUP3 switch?
• 172.16.50.96/27
• 172.16.50.97/27
• 172.16.50.98/27
• 172.16.50.99/27
• 255.255.255.0
12.Refer to the exhibit. Which set of router commands is required to turnon unequal-cost load sharing so that RTRA selects the path A-B-E andthe lowest cost path A-C-E to the Internet?
• RTRA(config)# router eigrp 1
RTRA(config-router)# variance 2
• RTRA(config)# router eigrp 1
RTRA(config-router)# variance 1
• RTRA(config)# router eigrp 1
RTRA(config-router)# maximum-paths 2
• RTRA(config)# router eigrp 1
RTRA(config-router)# maximum-paths 1
13.Refer to the exhibit. Assuming that the default EIGRP configuration isrunning on both routers, which statement is true about Router Areaching the 2.2.2.0/24 network?
• The no auto-summary command needs to be issued to disable automatic summarization.
• The network 2.2.2.0 command needs to be issued to ensure that Router A recognizes the 2.2.2.0 network.
• EIGRP supports VLSM and automatically recognizes the 2.2.2.0 network.
• EIGRP does not support VLSM; therefore it cannot be used with discontiguous networks.
14.Refer to the exhibit. The network administrator wants router RTA tosend only the summarized route of 10.10.0.0/16 to RTC. Whichconfiguration accomplishes this?
• RTA(config)# interface s0/0
RTA(config-if)# ip summary-address eigrp 101 10.10.0.0 255.255.0.0
RTA(config-if)# exit
RTA(config)# router eigrp 101
RTA(config-router)# no auto-summary
• RTA(config)# interface s0/1
RTA(config-if)# ip summary-address eigrp 101 10.10.0.0 255.255.0.0
RTA(config-if)# exit
RTA(config)# router eigrp 101
RTA(config-router)# no auto-summary
• RTA(config)# interface s0/0
RTA(config-if)# ip summary-address eigrp 101 10.10.0.0 255.255.0.0
• RTA(config)# interface s0/1
RTA(config-if)# ip summary-address eigrp 101 10.10.0.0 255.255.0.0
15. What is a good design practice when developing a hierarchical addressing scheme?
• Address the nodes in the Access Layer and work toward the Core Layer.
• Assign addresses to the Core devices before planning the addressing scheme for the server farm.
• Determine where statically configured addressing will be implemented.
• Determine what percentage of devices are wired and what percentage of devices are wireless.
16.A network administrator is asked to design a new addressing scheme fora corporate network. Presently, there are 850 users at the head office,220 users at sales, 425 at manufacturing, and 50 at the research site.Which statement defines the correct VLSM addressing map with minimalwaste using the 172.17.0.0/16 network?
• 172.17.0.0/20 head office
172.17.1.0/21 manufacturing
172.17.1.0/22 sales
172.17.3.0/26 research
• 172.17.48.0/19 head office
172.17.16.0/20 manufacturing
172.17.48.128/25 sales
172.17.48.0/26 research
• 172.17.0.0/22 head office
172.17.4.0/23 manufacturing
172.17.5.0/24 sales
172.17.6.0/26 research
• 172.17.2.0/22 head office
172.17.3.0/23 manufacturing
172.17.4.0/26 sales
172.17.4.128/25 research
16. How would the routes for networks 172.16.1.0/24, 172.16.3.0/24, and 172.16.15.0/24 be summarized?
• 172.16.0.0/20
• 172.16.0.0/21
• 172.16.0.0/22
• 172.16.0.0/24
17. What two advantages does CIDR provide to a network? (Choose two.)
• dynamic address assignment
• automatic route redistribution
• reduced routing update traffic
• easier management of summarization
• automatic summarization at classfull boundaries
18. Which statement describes MD5 authentication for neighbor authentication?
• All passwords are sent in clear text when neighbors first learn about each other.
• Only the initiating router sends its password using encrypted text when it first discovers a new router.
• All routers send their password using encrypted text only when they first learn of each other.
• All routers send their password using encrypted text each time they exchange update packets.
19. Refer to the exhibit. What are the broadcast addresses for each subnet?
• Admin - 172.16.31.0
QA - 172.16.1.127
Development - 172.16.2.255
Sales - 172.16.32.255
• Admin - 172.16.31.255
QA - 172.16.1.255
Development - 172.16.3.255
Sales - 172.16.63.255
• Admin - 172.16.31.255
QA - 172.16.1.127
Development - 172.16.3.255
Sales - 172.16.63.255
• Admin - 172.16.31.0
QA - 172.16.1.255
Development - 172.16.2.255
Sales - 172.16.32.255
20.Refer to the exhibit. The IT management is adding three VLANs to thewgroup3 switch. The current subnet will be broken down to support 14hosts for each of the new VLANs. What will the new subnet mask be forthese VLANs?
• 255.255.255.192
• 255.255.255.240
• 255.255.248.0
• 255.255.255.224
• 255.255.240.0
• 255.255.255.248
21. An administrator is configuring IPv6 on a router. The steps that have already been completed are:
1. Activate IPv6 traffic forwarding.
2. Configure IPv6 addresses.
3. Globally configure RIPng.
What is the remaining step to complete the activation of RIPng?
• Enter the ipv6 router rip name command and then use network statements to activate RIPng on the interfaces.
•Enter the ipv6 router rip name command and then specify whichinterfaces run RIPng, which are passive, and which only receive.
• Enter the interface mode for each IPv6 interface and enable RIPng with the ipv6 rip name enable command.
•Enter the interface mode for each IPv6 interface and enable themulticast group FF02::9, and then activate RIPng globally using theipv6 router rip name command.
• Enter the router rip command, andthen activate RIPng using the version command. RIPng then automaticallyruns on all IPv6 interfaces.
22. Which range includes all available networks in the 192.168.8.0/21 network?
• 192.168.8.0/24 - 192.168.14.0/24
• 192.168.8.0/24 - 192.168.15.0/24
• 192.168.8.0/24 - 192.168.16.0/24
• 192.168.8.0/24 - 192.168.17.0/24
23. Which two are best practices for creating a new IP addressing scheme for a network? (Choose two.)
• Plan and allow for significant growth.
• Assign addresses to the access layer before any other layer.
• Plan the entire addressing scheme before assigning any addresses.
• Begin with the access layer network summary addresses and work to the edge.
• Plan the addressing scheme to meet the current minimum requirement needs.
• Implement statically assigned addresses to all hosts in the distribution layer first.
24. Refer to the exhibit. Which subnet will provide sufficient addresses for the Production network with minimal waste?
• 172.16.0.192/26
• 172.16.0.192/27
• 172.16.0.224/26
• 172.16.0.160/26
• 172.16.0.144/27
25.A network designer is implementing a new network for a company. Thedesigner is using all new Cisco equipment and has decided to select ahierarchical routing protocol for the network. The designer wishes tominimize traffic from routing updates but also needs fast routingconvergence in the event of a topology change. Also, the existing IPaddressing scheme requires that the selected protocol support VLSM.Which routing protocol should be chosen?
• BGP
• RIP v1
• RIP v2
• OSPF
• EIGRP
1. Which mechanism is used to create a floating static route?
• administrative distance
• cost
• hop count
• passive interface
2. IPSec operates at which layer of the OSI model?
• application
• network
• datalink
• transport
3. Which is true regarding Frame Relay LMI?
• There are three LMI types standardized by ANSI, ITU-T, and Cisco.
• Routers at each end of a Frame Relay virtual circuit must always use the same LMI type.
• The LMI type must be manually configured.
• The only function of LMI is to verify the connection between the router and the Frame Relay switch.
4. Which statement identifies the IP address design for subinterfaces that are configured for a Frame Relay network?
• Multipoint configurations require the IP address of each subinterface on each router to be in its own subnet.
• Multipoint configurations require IP addresses for each subinterface on each router to be a part of the same subnet.
• Point-to-point configurations require IP addresses for each subinterface on each router to be a part of the same subnet.
• Point-to-point configurations do not require IP addresses on each subinterface on each router.
• Multipoint configurations do not require IP addresses on each subinterface on each router.
5. Which three algorithms can be used to encrypt user data in an IPSec VPN framework? (Choose three.)
• 3DES
• AES
• Diffie-Hellman
• DES
• ESP
• SHA
6. Which flag is set by a Frame Relay switch to inform the receiving station that congestion was experienced?
• BECN
• DE
• FECN
• FCS
7. Refer to the exhibit. The complete configuration of a Frame Relay interface on the Chicago router is shown. How does the Chicago router know which DLCI is mapped to the IP address of the remote router?
• DE
• CIR
• FECN
• Inverse ARP
8. What statement correctly defines the purpose of the split horizon rule?
• marks the route unreachable in a routing update that is sent to other routers
• prevents routers from advertising a network through the interface from which the update came
• prevents routers from accepting higher cost routes to networks previously marked as inaccessible before the timer expires
• limits the number of hops a packet can traverse through the network before it should be discarded
9. Which PVC status suggests that the router recognizes the DLCI configured on its interface as being present on the Frame Relay switch, but the PVC associated with the DLCI is not capable of end-to-end communication?
• active
• deleted
• inactive
• idle
10. Refer to the exhibit. Which router command is used to associate a Layer 2 address with the corresponding Layer 3 address?
• Miller(config-if)#frame-relay map ip 172.16.150.1 110
• Miller(config-if)#frame-relay map ip 172.16.150.1 112
• Miller(config-if)#frame-relay map ip 172.16.150.2 110
• Miller(config-if)#frame-relay map ip 172.16.150.2 112
11. A network administrator issued the command show frame-relay pvc. The response from the router shows the status of a PVC as deleted. What is the reason for this status?
• The DLCI is using the wrong LMI type.
• The DLCI is usable but has little activity.
• The DLCI is programmed in the switch but the circuit is not usable.
• The DLCI configured on the CPE device does not match the DLCI.
12. What is one benefit of using a network simulation software package?
• The network design can be tested before it is actually implemented.
• Simulation software packages are quickly updated to support new network technologies and devices.
• Simulated devices have the same features as actual devices, allowing for detection of all potential problems.
• Software packages can simulate all possible network traffic conditions, giving an accurate prediction of network performance.
13. What are two components a network designer considers when planning a VPN? (Choose two.)
• encryption algorithm for privacy and security
• encapsulation protocol to use when creating the VPN tunnel
• switching technology to optimize VPN WAN throughput
• tunneling technology for guarding against data corruption
• routing protocol on the gateway for optimum performance
14. When identifying VPN requirements for endpoint users, what care must be taken to protect the network when remote users log in from unsecured public locations?
• Ensure that the user has VPN client software that allows access to all internal resources.
• Ensure that the VPN user traffic does not slow down internally sourced traffic on the network.
• Ensure that there are no obstacles to hamper the users from accessing all internal resources.
• Ensure that remote users can only access network resources that are appropriate to their job function.
15. Which two components are key elements when implementing a VPN? (Choose two.)
• concentration
• encryption
• prioritization
• compression
• encapsulation
16. What tool can help ease the configuration of VPN servers on routers?
• Cisco SDM
• PIX Firewall
• Cisco VPN Concentrator
• Cisco Adaptive Security Appliances
17. What is used to identify the path to the next frame-relay switch in a Frame Relay network?
• CIR
• DLCI
• FECN
• BECN
18. Which two statements are true regarding VPN security? (Choose two.)
• Users may only establish a VPN connection from secure locations and never from public areas.
• Users that connect to a network through a VPN do not have to log in to resources on the network.
• Users that connect to a network through a VPN are are considered trusted users on the network.
• Users may establish a VPN connection from unsecure locations such as airports and hotel lobbies.
• Users that connect to a network through a VPN should have access to all the resources on the network.
19. Refer to the exhibit. What is placed in the address field of a frame that will travel from the Orlando office to the DC office?
• MAC address of the Orlando router
• MAC address of the DC router
• 192.168.1.25
• 192.168.1.26
• DLCI 100
• DLCI 200
20. Two directly connected routers are able to ping each other through the Serial 0/0/0 interfaces. A network administrator changes the encapsulation on one router to PPP, and the other is left at the default value. What statement would appear in the output of the show interfaces command issued on one of the routers?
• Serial 0/0/0 is up, line protocol is up
• Serial 0/0/0 is down, line protocol is down
• Serial 0/0/0 is up, line protocol is down
• Serial 0/0/0 is down, line protocol is up
• Serial 0/0/0 is administratively down, line protocol is down
21. Refer to the exhibit. What statement is true about the configuration shown for R2?
• R2 is configured as the Frame Relay switch.
• R2 is configured as the main site in a multipoint Frame Relay WAN prototype.
• R2 is configured as the main site in a point-to-point Frame Relay WAN prototype.
• R2 is configured as a remote site in a multipoint Frame Relay WAN prototype.
• R2 is configured as a remote site in a point-to-point Frame Relay WAN prototype.
22. A company uses serial interfaces on its border router to connect to branch offices through WAN connections. The security policy dictates that the encapsulation should use PPP with authentication protocol CHAP. Which statement is true about the configuration requirement of CHAP?
• Both the username and password are case sensitive.
• Neither the username nor the password is case sensitive.
• The username is case sensitive but the password is not case sensitive.
• The password is case sensitive but the username is not case sensitive.
23. Which two statements about split tunnels are true? (Choose two.)
• Local LAN printing will use the VPN tunnel.
• The traffic load on the VPN server is increased.
• Traffic to the corporate network will be encrypted.
• There is a reduced security risk to the corporate network.
• All traffic travels across the VPN tunnel from client to server.
• Traffic to public web sites and general Internet navigation is not encrypted.
24. An IP address has been assigned to the S0/0/0 interface of a new Cisco router. The administrator wishes to quickly test basic connectivity with the serial interface of an adjoining Cisco router via the use of the default WAN protocol. Which WAN protocol will be used for this test?
• PPP
• Frame Relay
• DSL
• HDLC
• ATM
25. Which two statements about split tunnels are true? (Choose two.)
• Local LAN printing will use the VPN tunnel.
• The traffic load on the VPN server is increased.
• Traffic to the corporate network will be encrypted.
• There is a reduced security risk to the corporate network.
• All traffic travels across the VPN tunnel from client to server.
• Traffic to public web sites and general Internet navigation is not encrypted.
LAB 3
STEP 1 : Identify the RAM in a computer
Check your computer and determine the amount of RAM available to the CPU. How much RAM is in your computer?
>> 1,99 GB of RAM in my computer.
STEP 2: Determine the size of the hard disk drive
The total capacity of the hard drive is shown above the Drive C icon.
a. Determine the size of the hard drive on your computer. What is the total size of the hard drive in GB?
>> The total is 48.8 GB
STEP 3: Determine the free space and used space on the hard drive
In the Local Disk Properties dialog box, the used and free space is shown in both bytes and GB above the Capacity.
a. What is the used space of your hard drive in GB?
>> The used space of your hard drive in GB is 7.63 GB
b. What is the free space of your hard drive in GB?
>> 41.1 GB
STEP 4: Check for other storage devices
a. How many drive letters are shown in the window that appears?
>> It have five drives
b. Right-click on a drive icon other than C: and select Properties. The Removable Disk Properties window appears.
c. Select the Hardware tab, which provides information on each device and whether it is working properly.
STEP 5 : Reflection
a. Why is it important to know the amount of RAM in your computer?
>> RAM is the actual workarea. All the calculation are the calculation are done in CPU and result and data is stored first on RAM and yhen transferred to harddisk.
b. Why is the size of a hard drive as well as the space being used important?
>>The size of hard disk and the space used is important only for those who were running out hard disk space and not or those who don’t have enough data to upload on their hard disk so the size of the hard disk and space used is important depending upon how an individual use the hardisk space.
Lab 1.4.5 Identifying Network Vulnerabilities
Step 1: Open the SANS Top 20 ListUsing a web browser, go to http://www.sans.org/. On the resources menu, choose top 20 list.
The SANS Top-20 Internet Security Attack Targets list is organized by category. An identifying letter
indicates the category type, and numbers separate category topics. Router and switch topics fall under the
Network Devices category, N. There are two major hyperlink topics:
N1. VoIP Servers and Phones
N2. Network and Other Devices Common Configuration Weaknesses
Step 2: Review common configuration weaknesses
a. Click hyperlink N2. Network and Other Devices Common Configuration Weaknesses.
b. List the four headings in this topic.
Deskripsi
Common Default Configuration Issues
Kerentanan pada printer
Bagaimana mengantisipasi kerentanan tersebut
Step 3: Review common default configuration issues
Review the contents of N2.2 Common Default Configuration Issues. As an example, N.2.2.2 (in January
2007) contains information about threats associated with default accounts and values. A Google search on
“wireless router passwords” returns links to multiple sites that publish a list of wireless router default
administrator account names and passwords. Failure to change the default password on these devices can
lead to compromised security and vulnerability to attackers.
Step 4: Note the CVE references
The last line under several topics cites references to CVE or Common Vulnerability Exposure. The CVE name
is linked to the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD),
sponsored by the United States Department of Homeland Security (DHS) National Cyber Security Division
and US-CERT, which contains information about the vulnerability.
Step 5: Investigate a topic and associated CVE hyperlink
The remainder of this lab walks you through a vulnerability investigation and solution.
Choose a topic to investigate, and click on an associated CVE hyperlink. The link should open a new web
browser connected to http://nvd.nist.gov/ and the vulnerability summary page for the CVE.
NOTE: Because the CVE list changes, the current list may not contain the same vulnerabilities as
those in January 2007.
Step 6: Record vulnerability information
Complete the information about the vulnerability. Answers vary
Original release date:
Last revised:
Source:
Overview:
Step 7: Record the vulnerability impact
Under Impact, there are several values. The Common Vulnerability Scoring System (CVSS) severity is
displayed and contains a value between 1 and 10.
Complete the information about the vulnerability impact. Answers vary
CVSS Severity:
Access Complexity:
Authentication:
Impact Type:
Step 8: Record the solution
The References to Advisories, Solutions, and Tools section contains links with information about the
vulnerability and possible solutions.
Using the hyperlinks, write a brief description of the solution found on those pages.
Step 9: Reflection
The number of vulnerabilities to computers, networks, and data, continues to increase. Many national
governments have dedicated significant resources to coordinating and disseminating information about
security vulnerability and possible solutions. It remains the responsibility of the end user to implement the
solution. Think of ways that users can help strengthen security. Write down some user habits that create
security risks.
Penggunaan kata sandi yang lemah
Penulisan kata sandi
Tidak mengubah kata sandi secara teratur
Tidak mengamankan workstation ketika tidak dipakai
Tidak mengikuti prosedur ketika membocorkan informasi jaringan
Lab 1.4.6B Implementing Port Security
Task 1: Configure and Test the Switch ConnectivityStep 1: Prepare the switch for configuration
a. Referring to the topology diagram, connect the console (or rollover) cable to the console port on the
switch and the other cable end to the host computer with a DB-9 or DB-25 adapter to the COM 1 port.
Ensure that power has been applied to both the host computer and switch.
b. Establish a console terminal session from PC1 to switch S1.
c. Prepare the switch for lab configuration by ensuring that all existing VLAN and general configurations
are removed.
1) Remove the switch startup configuration file from NVRAM.
Switch#erase startup-config
Erasing the nvram filesystem will remove all files! Continue? [confirm]
2) Press Enter to confirm.
The response should be:
Erase of nvram: complete
d. Power cycle the switch and exit the initial configuration setup when the switch restarts.
Step 2: Configure the switch
Configure the hostname and VLAN 1 interface IP address as shown in the table.
Step 3: Configure the hosts attached to the switch
a. Configure the two PCs to use the same IP subnet for the address and mask as shown in the table.
b. Connect PC1 to switch port Fa0/1 and PC2 to switch port Fa0/4. The Linksys device is not connected
at this stage of the lab.
Step 4: Verify host connectivity
Ping between all PCs and the switch to verify correct configuration. If any ping was not successful,
troubleshoot the hosts and switch configurations.
Step 5: Record the host MAC addresses
Determine and record the Layer 2 addresses of the PC network interface cards.
(For Windows 2000, XP, or Vista, check by using Start > Run > cmd > ipconfig /all.)
PC1 MAC Address: _______________________________ e.g., 00-07-EC-93-3CD1
PC2 MAC Address: _______________________________ e.g., 00-01-C7-E4-ED-E6
Step 6: Determine what MAC addresses the switch has learned
a. At the privileged EXEC mode prompt, issue the show mac-address-table command to display
the PC MAC addresses that the switch has learned.
FC-ASW-1#show mac-address-table
Record the details displayed in the table.
Mac Address Table
——————————————-
Vlan Mac Address Type Ports
—- ———– ——– —–
1 0001.c7e4.ede6 DYNAMIC Fa0/1
1 0007.ec93.3cd1 DYNAMIC Fa0/4
b. Note the MAC addresses shown and the associated switch ports. Confirm that these addresses and
ports match the connected PCs.
How were these MAC addresses and port associations learned?
Sumber alamat MAC dari ping echo permintaan dan balasan ping (gema) dicatat terhadap port masuk.
Task 2 Configure and Test the Switch for Dynamic Port Security
Step 1: Set port security options
a. Disconnect all PCs Ethernet cables from the switch ports.
b. Ensure that the MAC address table is clear of entries. To confirm this, issue the clear macaddress-
table dynamic and show mac-address-table commands.
a. Clear the MAC address table entries.
FC-ASW-1#clear mac-address-table dynamic
b. Issue the show mac-address-table command.
Record the table entries.
Mac Address Table
——————————————-
Vlan Mac Address Type Ports
—- ———– ——– —–
c. Determine the options for setting port security on interface FastEthernet 0/4. From the global
configuration mode, enter interface fastethernet 0/4.
FC-ASW-1(config)#interface fa 0/4
Enabling switch port security provides options, such as specifying what happens when a security
setting is violated.
d. To configure the switch port FastEthernet 0/4 to accept only the first device connected to the port,
issue the following commands from the configuration mode:
FC-ASW-1(config-if)#switchport mode access
FC-ASW-1(config-if)#switchport port-security
e. In the event of a security violation, the interface should be shut down. Set the port security action to
shutdown:
FC-ASW-1(config-if)#switchport port-security violation shutdown
FC-ASW-1(config-if)#switchport port-security mac-address sticky
What other action options are available with port security?
protect, restrict
f. Exit the configuration mode.
Step 2: Verify the configuration
a. Display the running configuration.
What statements in the configuration directly reflect the security implementation?
interface FastEthernet0/4
switchport mode access
switchport port-security
switchport port-security mac-address sticky
b. Show the port security settings.
FC-ASW-1#show port-security interface fastethernet 0/4
Record the details displayed in the table.
Port Security : Enabled
Port Status : Secure-down
Violation Mode : Shutdown
Aging Time : 0 mins
Aging Type : Absolute
SecureStatic Address Aging : Disabled
Maximum MAC Addresses : 1
Total MAC Addresses : 0
Configured MAC Addresses : 0
Sticky MAC Addresses : 0
Last Source Address:Vlan : 0000.0000.0000:0
Security Violation Count : 0
Step 3: Verify the port security
a. Connect PC1 to switch port Fa0/1 and PC2 to switch port Fa0/4.
b. From the command prompt ping from PC1 to PC2.
Was this successful? Ya
c. From the command prompt ping from PC2 to PC1.
Was this successful? Ya
d. From the console terminal session, issue the show mac-address-table command.
Record the details displayed in the table.
Mac Address Table
——————————————-
Vlan Mac Address Type Ports
—- ———– ——– —–
1 0001.c7e4.ede6 DYNAMIC Fa0/1
1 0007.ec93.3cd1 STATIC Fa0/4
e. Show the port security settings.
FC-ASW-1#show port-security interface fastethernet 0/4
Record the details displayed in the table.
Port Security : Enabled
Port Status : Secure-up
Violation Mode : Shutdown
Aging Time : 0 mins
Aging Type : Absolute
SecureStatic Address Aging : Disabled
Maximum MAC Addresses : 1
Total MAC Addresses : 1
Configured MAC Addresses : 0
Sticky MAC Addresses : 1
Last Source Address:Vlan : 0001.c7e4.ede6:1 [pc2]
Security Violation Count : 0
Note the difference in entries recorded in Step 2 b.
- Status port sekarang aman (PC terkoneksi)
- Ada 1 alamat MAC yang lekat
- Alamat sumber terakhir tampak
f. Confirm the status of the switch port.
ALSwitch#show interface fastethernet 0/4
What is the state of this interface?
FastEthernet0/4 is up and line protocol is up.
Step 4: Test the port security
a. Disconnect PC2 from Fa0/4
b. Connect PC2 to the Linksys using one of the ports on the Linksys LAN switch.
c. Use the Basic Setup tab to configure the Internet IP address on the Linksys device to the address
and mask, as shown in the table.
d. Configure PC2 to get an IP address using DHCP. Verify that PC2 receives an IP address from the
Linksys device.
e. Connect the Internet port on the Linksys to Fa0/4.
f. Ping from PC1 to PC2.
Was this successful? Tidak
g. Ping from PC2 to PC1.
Was this successful? Tidak
Record the output displayed on the console screen at the switch command line.
ERR_DISABLE: psecure-violation error detected on Fa0/4, putting Fa0/4
in err-disable state
%LINK-5-CHANGED: Interface FastEthernet0/4, changed state to
administratively down
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/4,
changed state to down
h. Issue the show mac-address-table command.
Record the details displayed in the table.
Mac Address Table
——————————————-
Vlan Mac Address Type Ports
—- ———– ——– —–
1 0001.c7e4.ede6 DYNAMIC Fa0/1
i. Show the port security settings.
FC-ASW-1#show port-security interface fastethernet 0/4
Record the details displayed in the table.
Port Security : Enabled
Port Status : Secure-shutdown
d. Configure PC2 to get an IP address using DHCP. Verify that PC2 receives an IP address from the
Linksys device.
e. Connect the Internet port on the Linksys to Fa0/4.
f. Ping from PC1 to PC2.
Was this successful? Tidak
g. Ping from PC2 to PC1.
Was this successful? Tidak
Record the output displayed on the console screen at the switch command line.
ERR_DISABLE: psecure-violation error detected on Fa0/4, putting Fa0/4
in err-disable state
%LINK-5-CHANGED: Interface FastEthernet0/4, changed state to
administratively down
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/4,
changed state to down
h. Issue the show mac-address-table command.
Record the details displayed in the table.
Mac Address Table
——————————————-
Vlan Mac Address Type Ports
—- ———– ——– —–
1 0001.c7e4.ede6 DYNAMIC Fa0/1
i. Show the port security settings.
FC-ASW-1#show port-security interface fastethernet 0/4
Record the details displayed in the table.
Port Security : Enabled
Port Status : Secure-shutdown
Violation Mode : Shutdown
Aging Time : 0 mins
Aging Type : Absolute
SecureStatic Address Aging : Disabled
Maximum MAC Addresses : 1
Total MAC Addresses : 1
Configured MAC Addresses : 0
Sticky MAC Addresses : 1
Last Source Address:Vlan : 0800.4606.fbb6:1
Security Violation Count : 1
Note the difference in entries recorded in Step 3 e.
- Status port sekarang shutdown
- Ada 1 security violation
- Sumber terakhir diubah terhadap perangkat Linksys
Confirm the status of the switch port.
FC-ASW-1#show interface fastethernet 0/4
What is the state of this interface?
FastEthernet0/4 is down and line protocol is down.
Step 5: Reactivate the port
a. If a security violation occurs and the port is shut down, enter interface Fa0/4 configuration mode,
disconnect the offending device, and use the shutdown command to temporarily disable the port.
b. Disconnect the Linksys and reconnect PC2 to port Fa0/4. Issue the no shutdown command on the
interface.
c. Ping from PC1 to PC2. This may have to be repeated multiple times before success.
List reasons why multiple ping attempts may be necessary before success is achieved.
- Spanning Tree Protocol perlu dijalankan
- Permintaan ARP harus dikirim dan diterima.
- Switch harus mempelajari port asosiasi MAC address
Step 6: Discuss switch port security using dynamic MAC address assignment
Advantages:
Alamat Host pada MAC tidak harus dicatat dan ditulis ketika saklar dikonfigurasi.
Ada fleksibilitas saat menghubungkan sejumlah besar host, menyediakan port yang digunakan dalam VLAN yang benar.
Disadvantages:
Jika host yang salah dihubungkan ke switch sebelum host yang benar, keamanan jaringan masih bisa dilanggar.
Host dapat dihubungkan ke VLAN yang salah.
Ketika sebuah NIC berubah di PC, atau ketika PC diganti, administrator jaringan secara manual harus mereset keamanan port.
Step 7: Clean up
Erase the configurations and reload the switches. Disconnect and store the cabling. For PC hosts that are
normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings.
Task 3: Reflection
When considering designing a typical enterprise network, it is necessary to think about points of security
vulnerability at the Access Layer. Discuss which Access Layer switches should have port security and those for which it may not be appropriate. Include possible future issues in regard to wireless and guest access to the network.
• Jenis host yang dihubungkan ke switch.
• Jenis pengguna – karyawan atau tamu
• Di mana akses dilakukan – di kantor yang aman atau di tempat umum
• Jenis akses – kabel atau nirkabel
• Investigasi keamanan fitur yang tersedia pada platform switch yang berbeda
• Bagaimana kebijakan keamanan port dapat diimplementasikan dan dikelola.
• statis dinamis versus keamanan port
Step 1: Analyze the traffic filtering requirements
a. Determine the access and filtering requirements.
For this lab:
1) PC1 is a network administrator’s workstation. This host must be permitted FTP and HTTP access to the network server, and telnet access to the router FC-CPE-1.
2) PC2 is a general workstation that is to have HTTP access only. FTP services and Telnet access to the router is not permitted.
b. Having determined specific requirements, decide if all other traffic is to be allowed or denied.
List the benefits and potential problems to the following filtering scenarios:
Benefits of allowing all other traffic:
Jawab :
layanan yang ada untuk ke depannya tidak dihalangi atau diblokir
Potential problems with allowing all other traffic:
Jawab :
Trafik berbahaya dan tidak diinginkan tidak diblok
Benefits of denying all other traffic:
Jawab :
Trafik yang berbahaya dan tidak diinginkan diblok secara otomatis
Potential problems with denying all other traffic:
Jawab :
Layanan yang diimplementasikan ke depannya akan diblok secara otomatis.
Step 2: Design and create the ACL
a. Review, and then apply, ACL recommended practice.
- • Always plan thoroughly before implementation.
- • The sequence of the statements is important. Put the more specific statements at the beginning
- • Statements are added to the end of the ACL as they are written.
- • Create and edit ACLs with a text editor and save the file.
- • Use Named ACLs wherever possible.
- • Use comments (remark option) within the ACL to document the purpose of the statements.
- • To take effect, ACLs must be applied to an interface.
- • An interface can have one ACL per Network Layer protocol, per direction.
- • Although there is an implicit deny any statement at the end of every ACL, it is good practice to
logging of matches to this statement to be used.
- • ACLs with many statements take longer to process, which may affect router performance.
- • Placement of ACLs:
o Extended: closest to source (if have administrative authority on that router)
b. Consider the two approaches to writing ACLs:
- • Permit specific traffic first and then deny general traffic.
- • Deny specific traffic first and then permit general traffic.
When would it be best to permit specific traffic first and then deny general traffic?
Jawab :
ACL tanpa banyak statement mengurangi paket latency
When would it be best to deny specific traffic first and then permit general traffic?
Jawab :
When there is likely to be more traffic of the type to be denied – these packets are matched early in the ACL without having to traverse many statements, minimizing router latency.
c. Select one approach and write the ACL statements that will meet the requirements of this lab.
Allow PC1 to access server http and ftp
access-list 101 permit tcp host 10.0.0.10 host 172.17.1.1 eq www log
access-list 101 permit tcp host 10.0.0.10 host 172.17.1.1 eq ftp log
Allow PC2 to access web server
access-list 101 permit tcp host 10.0.0.201 host 172.17.1.1 eq www log
Allow PC1 ftp access to router Fa0/0
access-list 101 permit tcp host 10.0.0.10 host 10.0.0.1 eq telnet log
Deny all other traffic
access-list 101 ip deny any any log
After an ACL is written and applied to an interface, it is useful to know if the ACL statements are
having the desired effect. The number of packets that meet the conditions of each ACL statement can
be logged by adding the option log at the end of each statement.
Why is it important to know to how many times packets that match an ACL statement are denied?
Jawab :
This potentially shows the number of attempts at unauthorized access to denied services that may lead to further investigation of network usage.
Step 3: Cable and configure the given network
NOTE: If the PCs used in this lab are also connected to your Academy LAN or to the Internet, ensure that you
record the cable connections and TCP/IP settings so these can be restored at the conclusion of the lab.
a. Referring to the topology diagram, connect the console (or rollover) cable to the console port on the
router and the other cable end to the host computer with a DB-9 or DB-25 adapter to the COM 1 port.
Ensure that power has been applied to both the host computer and router.
b. Connect and configure the devices in accordance with the given topology and configuration. Your
instructor may substitute Discovery Server with an equivalent server for this lab.
c. Establish a HyperTerminal, or other terminal emulation program, from PC1 to Router R1.
d. From the global configuration mode issue the following commands:
Router(config)#hostname FC-CPE-1
FC-CPE-1(config)#interface FastEthernet0/0
FC-CPE-1(config-if)#ip address 10.0.0.1 255.255.255.0
FC-CPE-1(config-if)#no shutdown
FC-CPE-1(config-if)#exit
FC-CPE-1(config)#interface FastEthernet0/1
FC-CPE-1(config-if)#ip address 172.17.0.1 255.255.0.0
FC-CPE-1(config-if)#no shutdown
FC-CPE-1(config-if)#exit
FC-CPE-1(config)#line vty 0 4
FC-CPE-1(config-line)#password telnet
FC-CPE-1(config-line)#login
FC-CPE-1(config-line)#end
e. Ping between PC1 and Discovery Server to confirm network connectivity. Troubleshoot and establish
connectivity if the pings fail.
Step 4: Test the network services without ACLs
Perform the following tests on PC1:
a. Open a web browser on PC1 and enter the URL http://172.17.1.1 at the address bar.
What web page was displayed?
Jawab :
Discovery Server Home Page
b. Open a web browser on PC1 and enter the URL ftp://172.17.1.1 at the address bar.
What web page was displayed?
Jawab :
Discovery FTP Home Directory
c. On the Discovery FTP Home Directory, open the Discovery 1 folder. Click and drag a Chapter file to
the local Desktop. Did the file copy successfully?
Jawab :
Ya
d. From the PC1 command line prompt, issue the command telnet 10.0.0.1, or use a Telnet client
(HyperTerminal or TeraTerm, for example) to establish a Telnet session to the router.
What response did the router display?
Jawab :
Prompt untuk password Telnet dan login ke router
e. Exit the Telnet session.
Quit
Perform the following tests on PC2:
a. Open a web browser on PC2 and enter the URL http://172.17.1.1 at the address bar.
What web page was displayed?
Jawab :
Discovery Server Home Page
b. Open a web browser on PC2 and enter the URL ftp://172.17.1.1 at the address bar.
What web page was displayed?
Jawab :
Discovery FTP Home Directory
c. On the Discovery FTP Home Directory, open the Discovery 1 folder. Click and drag a Chapter file to
the local Desktop. Did the file copy successfully?
Jawab :
Ya
d. From the PC2 command line prompt, issue the command telnet 10.0.0.1, or use a Telnet client
(HyperTerminal or TeraTerm, for example) to establish a Telnet session to the router.
What response did the router display?
Jawab :
Prompt untuk password Telnet dan login ke router
e. Exit the Telnet session.
quit
Why was each of the above connections successful?
Jawab :
There were no data access or filtering controls in place.
Successful connection was expected.
If any of the above connections was not successful, troubleshoot the network and configurations and
establish each type of connection from each host.
Step 5: Configure the network services ACL
From the global configuration mode issue the following commands:
a. Allow PC1 to access the web server and telnet to the router.
FC-CPE-1(config)#ip access-list extended Server-Access
FC-CPE-1(config-ext-nacl)#remark Allow PC1 access to server
FC-CPE-1(config-ext-nacl)#permit tcp host 10.0.0.10 host 172.17.1.1 eq
ftp www log
b. Allow PC2 to access the web server.
FC-CPE-1(config-ext-nacl)#remark Allow PC2 to access web server
FC-CPE-1(config-ext-nacl)#permit tcp host 10.0.0.201 host 172.17.1.1 eq
www log
c. Allow PC1 telnet access to router
FC-CPE-1(config-ext-nacl)#remark Allow PC1 to telnet router
FC-CPE-1(config-ext-nacl)#permit tcp host 10.0.0.10 host 10.0.0.1 eq telnet log
d. Deny all other traffic.
FC-CPE-1(config-ext-nacl)#remark Deny all other traffic
FC-CPE-1(config-ext-nacl)#deny ip any any log
FC-CPE-1(config-ext-nacl)#exit
Step 6: Apply the ACLs
a. Apply the Extended ACL to the router interface closest to the source.
FC-CPE-1(config)#interface FastEthernet0/0
FC-CPE-1(config-if)#ip access-group Server-Access in
FC-CPE-1(config-if)#end
b. From the Privileged EXEC mode, issue the show running-configuration command and
confirm that the ACLs have been configured and applied as required.
Reconfigure if errors are noted.
Step 7: Test the network services with ACLs
Perform the following tests on PC1:
a. Open a web browser on PC1 and enter the URL http://172.17.1.1 at the address bar.
What web page was displayed?
Jawab :
Discovery Server Home Page
b. Open a web browser on PC1 and enter the URL ftp://172.17.1.1 at the address bar.
What web page was displayed?
Jawab :
Discovery FTP Home Directory
c. On the Discovery FTP Home Directory, open the Discovery 1 folder. Click and drag a Chapter file to
the local Desktop. Did the file copy successfully?
Jawab :
Ya
Why is this the outcome?
Jawab :
Host ini memungkinkan akses FTP
d. From the PC1 command line prompt, issue the command telnet 10.0.0.1, or use a Telnet client
(HyperTerminal or TeraTerm, for example) to establish a Telnet session to the router.
What response did the router display?
Jawab :
Prompt untuk password Telnet dan login ke router
Why is this the outcome?
Jawab :
Host ini memungkinkan akses Telnet
e. Exit the Telnet session.
Perform the following tests on PC2:
a. Open a web browser on PC2 and enter the URL http://172.17.1.1 at the address bar.
What web page was displayed?
Jawab :
Discovery Server Home Page
Why is this the outcome?
Jawab :
Host ini memungkinkan akses web
b. Open a web browser on PC2 and enter the URL ftp://172.17.1.1 at the address bar.
What web page was displayed?
Jawab :
error page cannot be displayed
Why is this the outcome?
Jawab :
Host ini tidak memungkinkan akses FTP
c. From the PC2 command line prompt, issue the command telnet 10.0.0.1, or use a Telnet client
(HyperTerminal or TeraTerm, for example) to establish a Telnet session to the router.
What response did the router display?
Jawab :
Telnet connection refused.
Why is this the outcome?
Jawab :
Host tidak memungkinkan akses Telnet
If any of these transactions did not result in the expected outcome, troubleshoot the network and
configurations and retest the ACLs from each host.
Step 8: Observe the number of statement matches
a. From the Privileged EXEC mode, issue the command:
FC-CPE-1#show access-list Server-Access
List the number of matches logged against each ACL statement.
Step 9: Clean up
Erase the configurations and reload the routers and switches. Disconnect and store the cabling. For PC hosts
that are normally connected to other networks (such as the school LAN or to the Internet), reconnect the
appropriate cabling and restore the TCP/IP settings.
Challenge
Rewrite the Server-Access ACL used in this lab so that:
1) Administrator workstations are considered to be in the address range of 10.0.0.10 /24 to
10.0.0.15 /24 instead of a single host; and,
2) The general workstations have the address range of 10.0.0.16 /24 to 10.0.0.254 /24 instead of
being a single host.
Jawab :
ip access-list extended Server-Access
remark Allow PC1 to access any IP traffic
permit ip host 10.0.0.0 0.0.0.15 172.17.1.1 log
remark Allow PC2 to access web server
permit ip host 10.0.0.0 0.0.0.255 172.17.1.1 eq www log
remark Deny all other traffic
deny ip any any log
Running config of router after lab completion:
FC-CPE-1#show run
Building configuration…
Current configuration : 1309 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname FC-CPE-1
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
!
resource policy
!
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-timeout 180
ip subnet-zero
ip cef
!
!
!
!
!
!
!
!
!
interface FastEthernet0/0
ip address 10.0.0.1 255.255.255.0
ip access-group Server-Access in
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 172.17.0.1 255.255.0.0
duplex auto
speed auto
!
interface FastEthernet0/0/0
!
interface FastEthernet0/0/1
!
interface FastEthernet0/0/2
!
interface FastEthernet0/0/3
!
interface Serial0/1/0
no ip address
shutdown
clock rate 125000
!
interface Serial0/1/1
no ip address
shutdown
clock rate 125000
!
interface Vlan1
no ip address
!
ip classless
!
ip http server
!
ip access-list extended Server-Access
remark Allow PC1 access to server
permit tcp host 10.0.0.10 host 172.17.1.1 eq ftp www
remark Allow PC2 to access web server
permit tcp host 10.0.0.201 host 172.17.1.1 eq www
remark Allow PC1 to telnet router
permit tcp host 10.0.0.10 host 10.0.0.1 eq telnet
remark Deny all other traffic
deny ip any any
!
!
control-plane
!
!
line con 0
line aux 0
line vty 0 4
password telnet
login
!
end
FC-CPE-1#
Equipment / media | price | quality |
USB and solid-state drives | $30-$90 | medium |
fireWire drives | $180 | best |
CD-RW and DVD+RW/-RW drives | $100 | medium |
Router | Interface | Allow or Deny? | Input or output filter? | Why? |
Router 2 | 0/0 dan 0/1 | deny | input | Karena hanya untuk mengekses server yang berada di internal jaringan dan tidak bisa untuk eksternal jaringan atau jaringan luar |
Router | Interface | Allow or Derry? | Input or output filter? | Why? |
Router 1 dan 3 | 0/0 dan 0/1 | allow | output | Karena diizinkan untu mengakses jaringan internal dan eksternal |
Router | Interface | Input or output filter? | Port | Allow or Deny? | Why? |
Router 1 | 0/0 dan 0/1 | input | 0 | deny | Jaringan internal |
Router 2 | 0/0 dan 0/1 | output | 0 | allow | Jaringan eksternal |
Router3 | 0/0 dan 0/1 | output | 0 | allow | Jaringan eksternal |
Company | Product |
smadav | Smadav |
morphic | Morposh |
Avira | Avira |
Company | Product | Price |
microsoft | Windows | Rp.1.500.000 |
Linux | free | |
aple | machintosh | Rp.5.000.000 |