Lab 5.5.2: Access Control Lists Challenge
Số trang: 9
Loại file: doc
Dung lượng: 256.00 KB
Lượt xem: 22
Lượt tải: 0
Xem trước 2 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
You can use any current router in your lab as long as it has the required interfaces shown in the topologydiagram.
Nội dung trích xuất từ tài liệu:
Lab 5.5.2: Access Control Lists ChallengeLab 5.5.2: Access Control Lists Challenge Topology DiagramAddressing Table Device Interface IP Address Subnet Mask Default Gateway S0/0/0 10.1.0.1 255.255.255.0 N/A R1 Fa0/1 10.1.1.254 255.255.255.0 N/A S0/0/0 10.1.0.2 255.255.255.0 N/A R2 S0/0/1 10.3.0.1 255.255.255.0 N/A Lo 0 10.13.205.1 255.255.0.0 N/A S0/0/1 10.3.0.2 255.255.255.0 N/A R3 Fa0/1 10.3.1.254 255.255.255.0 N/A PC 1 NIC 10.1.1.1 255.255.255.0 10.1.1.254 PC 3 NIC 10.3.1.1 255.255.255.0 10.3.1.254 All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 9 CCNA Exploration Accessing the WAN: ACLs Lab 5.5.2: Access Control Lists ChallengeLearning Objectives To complete this lab: • Design named standard and named extended ACLs. • Apply named standard and named extended ACLs. • Test named standard and named extended ACLs. • Troubleshoot named standard and named extended ACLs.Task 1: Prepare the Network Step 1: Cable a network that is similar to the one in the Topology Diagram. You can use any current router in your lab as long as it has the required interfaces shown in the topology diagram. Note: If you use a 1700, 2500, or 2600 router, the router outputs and interface descriptions may appear different. Step 2: Clear any existing configurations on the routers.Task 2: Perform Basic Router Configurations. Configure the R1, R2, and R3 routers according to the following guidelines: • Configure the router hostname. • Disable DNS lookup. • Configure an EXEC mode password. • Configure a message-of-the-day banner. • Configure a password for console connections. • Configure a password for VTY connections. • Configure IP addresses on all devices. • Create a loopback interface on R2. • Enable OSPF area 0 on all routers for all networks. • Verify full IP connectivity using the ping command. R1 hostname R1 no ip domain-lookup enable secret class ! interface FastEthernet0/1 ip address 10.1.1.254 255.255.255.0 no shutdown ! interface serial 0/0/0 ip address 10.1.0.1 255.255.255.0 clock rate 125000 no shutdown ! All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 9CCNA ExplorationAccessing the WAN: ACLs Lab 5.5.2: Access Control Lists Challengerouter ospf 1 network 10.1.0.0 0.0.0.255 area 0 network 10.1.1.0 0.0.0.255 area 0!banner motd ^Unauthorized access strictly prohibited, violators will beprosecuted to the full extent of the law.^!line con 0 logging synchronous password cisco login!line vty 0 4 password cisco login!R2hostname R2enable secret classno ip domain lookup!interface Loopback0 ip address 10.13.205.1 255.255.0.0!interface Serial0/0/0 ip address 10.1.0.2 255.255.255.0 no shutdown!interface Serial0/0/1 ip address 10.3.0.1 255.255.255.0 clockrate 125000 no shutdown!router ospf 1 network 10.1.0.0 0.0.0.255 area 0 network 10.3.0.0 0.0.0.255 area 0 network 10.13.0.0 0.0.255.255 area 0!banner motd ^Unauthorized access strictly prohibited, violators will beprosecuted to the full extent of the law.^!line con 0 password cisco logging synchronous login!line vty 0 4 password cisco login!R3hostname R3All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 9 CCNA Exploration Accessing the WAN: ACLs Lab 5.5.2: Access Control Lists Challenge ! enable secret class no ip domain lookup ! interface FastEthernet0/1 ip address 10.3.1.254 255.255.255.0 no shutdown ! interface Serial0/0/1 ip address 10.3.0.2 255.255.255.0 no shutdown ! router ospf 1 network 10.3.0.0 0.0.0.255 area 0 network 10.3.1.0 0.0.0.255 area 0 ! banner motd ^Unauthorized access strictly prohibited, violators will be prosecuted to the full extent of the law.^ ! line con 0 password cisco logging synchronous login ! line vty 0 4 password cisco login !Task 3: Configuring Standard ACLs Configure standard named ACLs on the R1 and R3 VTY lines, permitting hosts connected directly to their FastEthernet subnets to gain Telnet access. Deny and log all other connection attempts. Document your testing procedures. __________________________________________________________________________________ _________________________________________________________________________ ...
Nội dung trích xuất từ tài liệu:
Lab 5.5.2: Access Control Lists ChallengeLab 5.5.2: Access Control Lists Challenge Topology DiagramAddressing Table Device Interface IP Address Subnet Mask Default Gateway S0/0/0 10.1.0.1 255.255.255.0 N/A R1 Fa0/1 10.1.1.254 255.255.255.0 N/A S0/0/0 10.1.0.2 255.255.255.0 N/A R2 S0/0/1 10.3.0.1 255.255.255.0 N/A Lo 0 10.13.205.1 255.255.0.0 N/A S0/0/1 10.3.0.2 255.255.255.0 N/A R3 Fa0/1 10.3.1.254 255.255.255.0 N/A PC 1 NIC 10.1.1.1 255.255.255.0 10.1.1.254 PC 3 NIC 10.3.1.1 255.255.255.0 10.3.1.254 All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 9 CCNA Exploration Accessing the WAN: ACLs Lab 5.5.2: Access Control Lists ChallengeLearning Objectives To complete this lab: • Design named standard and named extended ACLs. • Apply named standard and named extended ACLs. • Test named standard and named extended ACLs. • Troubleshoot named standard and named extended ACLs.Task 1: Prepare the Network Step 1: Cable a network that is similar to the one in the Topology Diagram. You can use any current router in your lab as long as it has the required interfaces shown in the topology diagram. Note: If you use a 1700, 2500, or 2600 router, the router outputs and interface descriptions may appear different. Step 2: Clear any existing configurations on the routers.Task 2: Perform Basic Router Configurations. Configure the R1, R2, and R3 routers according to the following guidelines: • Configure the router hostname. • Disable DNS lookup. • Configure an EXEC mode password. • Configure a message-of-the-day banner. • Configure a password for console connections. • Configure a password for VTY connections. • Configure IP addresses on all devices. • Create a loopback interface on R2. • Enable OSPF area 0 on all routers for all networks. • Verify full IP connectivity using the ping command. R1 hostname R1 no ip domain-lookup enable secret class ! interface FastEthernet0/1 ip address 10.1.1.254 255.255.255.0 no shutdown ! interface serial 0/0/0 ip address 10.1.0.1 255.255.255.0 clock rate 125000 no shutdown ! All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 9CCNA ExplorationAccessing the WAN: ACLs Lab 5.5.2: Access Control Lists Challengerouter ospf 1 network 10.1.0.0 0.0.0.255 area 0 network 10.1.1.0 0.0.0.255 area 0!banner motd ^Unauthorized access strictly prohibited, violators will beprosecuted to the full extent of the law.^!line con 0 logging synchronous password cisco login!line vty 0 4 password cisco login!R2hostname R2enable secret classno ip domain lookup!interface Loopback0 ip address 10.13.205.1 255.255.0.0!interface Serial0/0/0 ip address 10.1.0.2 255.255.255.0 no shutdown!interface Serial0/0/1 ip address 10.3.0.1 255.255.255.0 clockrate 125000 no shutdown!router ospf 1 network 10.1.0.0 0.0.0.255 area 0 network 10.3.0.0 0.0.0.255 area 0 network 10.13.0.0 0.0.255.255 area 0!banner motd ^Unauthorized access strictly prohibited, violators will beprosecuted to the full extent of the law.^!line con 0 password cisco logging synchronous login!line vty 0 4 password cisco login!R3hostname R3All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 9 CCNA Exploration Accessing the WAN: ACLs Lab 5.5.2: Access Control Lists Challenge ! enable secret class no ip domain lookup ! interface FastEthernet0/1 ip address 10.3.1.254 255.255.255.0 no shutdown ! interface Serial0/0/1 ip address 10.3.0.2 255.255.255.0 no shutdown ! router ospf 1 network 10.3.0.0 0.0.0.255 area 0 network 10.3.1.0 0.0.0.255 area 0 ! banner motd ^Unauthorized access strictly prohibited, violators will be prosecuted to the full extent of the law.^ ! line con 0 password cisco logging synchronous login ! line vty 0 4 password cisco login !Task 3: Configuring Standard ACLs Configure standard named ACLs on the R1 and R3 VTY lines, permitting hosts connected directly to their FastEthernet subnets to gain Telnet access. Deny and log all other connection attempts. Document your testing procedures. __________________________________________________________________________________ _________________________________________________________________________ ...
Tìm kiếm theo từ khóa liên quan:
thủ thuật máy tính phương thức xử lý xử lý thông tin xử lý tương tác dữ liệu máy tínhTài liệu có liên quan:
-
Top 10 mẹo 'đơn giản nhưng hữu ích' trong nhiếp ảnh
11 trang 367 0 0 -
Làm việc với Read Only Domain Controllers
20 trang 348 0 0 -
Đáp án đề thi học kỳ 2 môn cơ sở dữ liệu
3 trang 340 1 0 -
PHÂN TÍCH THIẾT KẾ HỆ THỐNG XÂY DỰNG HỆ THỐNG ĐẶT VÉ TÀU ONLINE
43 trang 309 2 0 -
Sửa lỗi các chức năng quan trọng của Win với ReEnable 2.0 Portable Edition
5 trang 238 0 0 -
Phần III: Xử lý sự cố Màn hình xanh
3 trang 237 0 0 -
Tóm tắt luận án tiến sỹ Một số vấn đề tối ưu hóa và nâng cao hiệu quả trong xử lý thông tin hình ảnh
28 trang 234 0 0 -
Tổng hợp 30 lỗi thương gặp cho những bạn mới sử dụng máy tính
9 trang 226 0 0 -
Sao lưu dữ liệu Gmail sử dụng chế độ Offline
8 trang 223 0 0 -
Giáo trình Bảo trì hệ thống và cài đặt phần mềm
68 trang 222 0 0