OSPF Practice Skills Assessment - Packet Tracer



Comments



Description

CCNA Routing and SwitchingScaling Networks OSPF Practice Skills Assessment - Packet Tracer A few things to keep in mind while completing this activity: 1. Do not use the browser Back button or close or reload any exam windows during the exam. 2. Do not close Packet Tracer when you are done. It will close automatically. 3. Click the Submit Assessment button in the browser window to submit your work. Introduction In Part I of this practice skills assessment, you will configure the Tech Company network with routing and ACLs. You will configure dynamic routing with OSPFv2 and distribute a default route. In addition, you will configure two access control lists. In Part II of this practice skills assessment, you will configure the Tech Company network with RPVST+, port security, EtherChannel, DHCP, VLANs and trunking, and routing between VLANs. In addition you will perform an initial configuration on a switch, secure switch ports and create SVIs. You will also control access to the switch management network with an access control list. All IOS device configurations should be completed from a direct terminal connection to the device console from an available host. Some values that are required to complete the configurations have not been given to you. In those cases, create the values that you need to complete the requirements. These values may include certain IP addresses, passwords, interface descriptions, banner text, and other values. When you have been given a text value, such as a password, user name, DHCP pool name, ACL name, VLAN name, etc, you must enter these values exactly as they are given in these instructions. If the values do not match exactly, you may not receive credit for your configuration. Configure and propagate a default route through OSPFv2. are essential elements of a network configuration. descriptions. especially those related to device security. Configure interfaces with IPv4 addresses. Main:     Configure interfaces with IPv4 addresses. and other settings.For the sake of time. The intent of this activity is not to diminish the importance of full device configurations. Configure and customize OSPFv2. You will practice and be assessed on the following skills:               Configuration of initial device settings IPv4 address assignment and configuration Configuration and addressing of device interfaces Configuration of the OSPFv2 routing protocol Configuration of a default route Configuration of ACL to limit device access Configuration of switch management settings including SSH Configuration of port security Configuration of unused switch ports according to security best practices Configuration of RPVST+ Configuration of EtherChannel Configuration of a router as a DHCP server Configuration of VLANs and trunks Configuration of routing between VLANs You are required to do the following: Building 1:    Configure initial device settings. Configure and customize OSPFv2. . many repetitive but important configuration tasks have been omitted from this activity. descriptions. and other settings. Configure named and numbered ACLs. Many of these tasks. Configure routing between VLANs. Configure OSPFv2. Configure trunking. FL-B:       Create and name VLANs. Configure a standard ACL. Configure port security. descriptions. . Internal PC hosts:  Configure as DHCP clients. Assign access ports to VLANs. Configure EtherChannel. Activate and configure RPVST+. Configure DHCP pools and excluded addresses. Configure trunking. FL-A:         Create and name VLANs. and other settings. Assign access ports to VLANs. Activate and configure RPVST+. Configure remote management settings with SSH. Assign access ports to VLANs.Building 2:      Configure interfaces with IPv4 addresses. Configure EtherChannel. Configure trunking. Activate RPVST+. Secure unused switch ports. Configure EtherChannel. Configure remote management settings. Configure switch ports with PortFast and BPDU Guard. Configure remote management settings. FL-C:        Create and name VLANs.  Assign static IPv4 addresses where indicated.8 G0/1.168. Any 203.168.9.36/30 network (The first address in this network is already in use on the ISP router.10.) any address in the 192.8.0/24 network 10.15.25.2.0/24 first host address any address in the 192.36/30 network first address in the 10.0/24 first host address 192.168.113.0/24 network first address in the 10.0/24 first address in the .15 G0/1.0/24 network first address in the 10.168. Addressing Table: Device Building 1 Interface Network S0/0/0 192.100.25 Configuration Details any address in the network 192.4.2 Building 2 G0/1. Tables Note: You are provided with the networks that interfaces should be configured on.100.16/29 other address in the network can be assigned to this interface. you are free to choose the host addresses to assign.0/24 network first address in the 10.20/30 network any address in the 192.168.4 G0/1.10. Unless you are told to do differently in the detailed instructions below.100.10.168.0.8.20/30 G0/0 G0/1 S0/0/0 S0/0/1 Main S0/1/0 S0/0/1 G0/1.100.10.10. 10.10.15.168.0/24 FL-B FL-C dept1 10.8.10.0/24 FL-C SVI 10.0/24 FL-C FL-A dept3 10.0/24 FL-C FL-A manage 10.9.4.10.10.10.10.2.168.15.10.25.0/24 FL-B SVI 10.0/24 Lab B-2 NIC 192.0/24 Lab A-1 NIC 192.0/24 FL-C FL-A NetAdmin 10.25.0/24 NetAdmin1 NetAdmin2 network the highest address in the network the second to the highest address in the network the third to the highest address in the network any address in the network any address in the network any available address in network any available address in network VLAN Switch Port Assignment Table: VLAN 2 4 8 15 25 99 Name Network Device FL-A FL-C FL-A dept2 10.10.0/24 NIC 10.25.15.FL-A SVI 10.0/24 safe N/A Port-Channel Groups: FL-A Switch Ports Fa0/5 Fa0/7 Fa0/10 Fa0/10 Fa0/15 Fa0/15 Fa0/24 Fa0/24 SVI SVI SVI all unused ports .8.25.0/24 NIC 10.10. Encrypt all clear text passwords. Configure a message-of-the-day banner. Step 3: Configure the Router Interfaces. Step 2: Configure Building 1. Prevent the router from attempting to resolve command line entries to IP addresses. Fa0/6 Fa0/5. Follow the configuration details provided in the Addressing Table. Configure Building 1 with initial settings:        Configure the router host name: Bldg-1. Fa0/2 Fa0/1. Configure the interfaces of all routers for full connectivity with the following: . Secure the router console and remote access lines.Channel Device FL-A 1 FL-C FL-A 2 FL-B FL-B 3 FL-C Interfaces Fa0/1. Fa0/4 Fa0/3. Fa0/2 Fa0/3. Protect device configurations from unauthorized access with an encrypted secret password. Fa0/4 Fa0/5. Fa0/6 Instructions All configurations must be performed through a direct terminal connection to the device console line from an available host. Determine the IP addresses that you will use for the required interfaces on the devices and LAN hosts. Prevent system status messages from interrupting console output. Part I: OSPFv2 Router Configuration Step 1: Plan the Addressing. This value must be entered exactly as it appears here. Use the exit interface argument. The Ethernet subinterfaces on Building 2 will configured later in this assessment. Prevent routing updates from being sent to the LANs. Use a rate of 128000. Set the bandwidth of all serial interfaces to 128 kb/s. Use the area numbers shown in the topology. Use a process ID of 1. Customize multiarea OSPFv2 by performing the following configuration tasks: a. . Use the correct wild card masks for all network statements. Step 6: Configure OSPF Routing.  Do not route the VLAN 99 network.    IP addressing Descriptions for the three connected interfaces of Main. On the Main router:  Configure multiarea OSPFv2 to distribute the default route to the other routers. Configure router Building 2 to route between VLANs using information in the Addressing Table and VLAN Switch Port Assignment Table. On all routers:      Configure multiarea OSPFv2 to route between all internal networks. The VLANs will be configured on the switches later in this assessment. configure a default route to the Internet. Configure DCE settings where required. Step 4: Configure inter-VLAN routing on Building 2. Step 7: Customize Multiarea OSPFv2. b. You are not required to route the manage VLAN network on Building 2. On Main. a. Step 5: Configure Default Routing. c.3 The configured router IDs should be in effect on all three routes.    Use a key value of 1. Apply MD5 authentication to the required interfaces. Allow only Test Host to access the vty lines of Main. Your ACL should be placed in the most efficient location as possible to conserve network bandwidth and device processing resources.3.3. The ACL specifications are as follows: a. You should use the any and host keywords in the ACL statements as required. .2. Restrict access to the vty lines on Main with an ACL:      Create a named standard ACL using the name telnetBlock. Configure the OSPF cost of the link between Building 1 and Main to 7500. Step 8: Configure OSPF MD5 Authentication on the Required Interfaces. b. Configure OSPF to authenticate routing updates with MD5 authentication on the OSPF interfaces.1.2. Block ping requests from the Internet with an ACL:  Use access list number 101. You will configure two access control lists in this step.1. Use xyz_OSPF as the password. Step 9: Configure Access Control Lists. Your solution should consist of one ACL statement. Be sure that you enter this name exactly as it appears in this instruction or you will not receive credit for your configuration. Configure OSPF router IDs as follows:     Building 1: 1.2 Building 2: 3.1 Main: 2. No other Internet hosts (including hosts not visible in the topology) should be able to access the vty lines of Main.b. Your list should consist of one statement. Prevent all other Internet hosts (not only the Internet hosts visible in the topology) from pinging addresses inside the Tech Company network. Only echo messages should be permitted. Your ACL should consist of three statements.   The VLAN names that you configure must match the values in the table exactly. as follows: . Using the VLAN table. assign switch ports to the VLANs you created in Step 1. Step 2: Assign switch ports to VLANs. c. Control access to the management interfaces (SVI) of the three switches attached to Building 2 as follows:        Create a standard ACL. Use the number 1 for the list. Block echo messages only. Your ACL should be placed in the most efficient location as possible to conserve network bandwidth and device processing resources. Permit only addresses from the NetAdmin VLAN network to access any address on the manage VLAN network. create and name the VLANs shown in the VLAN Table. On all three switches that are attached to Building 2.     Allow only Test Host to ping addresses within the Tech Company network. Each switch should be configured with all of the VLANs shown in the table. All other traffic should be allowed. Your ACL should be placed in the most efficient location as possible to conserve network bandwidth and device processing resources. Part II: Switching and DHCP Configuration Step 1: Create and name VLANs. You will be able to test this ACL at the end of Part II of this assessment. Hosts on the NetAdmin VLAN network should be able to reach all other destinations. Create and address the SVIs on all three of the switches that are attached to Building 2. a. The switch ports on the FL-B side of Channel 3 should initiate negotiations with the switch ports on FL-C. This configuration step on switches FL-B and FL-C is not required in this assessment for the sake of time. c. Activate Rapid PVST+ and set root priorities. Configure the switches so that they can communicate with hosts on other networks. The switch ports on both sides of Channels 1 and 2 should initiate negotiations for channel establishment. Configure static trunking on the switch port on FL-B that is connected toBuilding 2. Refer to the Addressing Table.    All switch ports that you assign to VLANsn should be configured to static access mode. Configure Rapid PVST+ as follows: a. All channels should be ready to forward data after they have been configured. b. Step 5: Configure Rapid PVST+. The switch ports on the FL-C side of Channel 3 should not initiate negotiations with the switch ports on the other side of the channel. Note that all of the unused ports on FL-A should be assigned to VLAN 99. . All switch ports that you assign to VLANs should be activated. Full connectivity will be established after routing between VLANs has been configured later in this assessment. Secure the unused switch ports on FL-A by shutting them down. Step 4: Configure Trunking and EtherChannel. Use the information in the Port-Channel Groups table to configure EtherChannel as follows:      Use LACP. Configure all port-channel interfaces as trunks. Step 3: Configure the SVIs. If a security violation occurs.com. FL-C should be configured as root secondary for VLAN 2 and VLAN 4using the default secondary priority values. FL-A should be configured as root secondary for VLAN 8 and VLAN 15using the default secondary priority values.   On FL-C. b. Step 6: Configure switch security. configure PortFast on the access ports that are connected to hosts. a. activate BPDU Guard on the access ports that are connected to hosts. FL-C should be configured as root primary for VLAN 8 and VLAN 15 using the default primary priority values. On FL-B.    Each active access port should accept only two MAC addresses before a security action occurs. On FL-C. Use a modulus value of 1024. Configure port security on all active access ports that have hosts connected on FL-A. In reality. . the switch ports should provide notification that a violation has occurred but not place the interface in an errdisabled state.     Use a domain name of ccnaPTSA. Activate PortFast and BPDU Guard on the active FL-C switch access ports. configure the virtual terminal lines to accept only SSH connections. You are required to complete the following only on some of the devices in the network for this assessment. The learned MAC addresses should be recorded in the running configuration. FL-A should be configured as root primary for VLAN 2 and VLAN 4 using the default primary priority values. b. security should be configured on all devices in the network.     All three switches should be configured to run Rapid PVST+. Configure SSH version 2. Use FL-B as the host name. Create a DHCP pool for hosts on VLAN 2 using the pool name vlan2pool.168. and 8 should be configured to receive addresses dynamically over DHCP.  Hosts on VLANs 2. Step 7: Configure Building 2 as a DHCP server for the hosts attached to the FL-A and FL-C switches. Step 8: Configure host addressing. They should all be in access mode. Due to the complexities of the protocols and technologies that are simulated in this network. Note: This assessment is a simulation of a working network. Ensure that all unused switch ports on FL-A have been secured as follows:    They should be assigned to VLAN 99. c. where permitted. your score will not be affected. some connectivity tests may not succeed even though the network has been properly configured. They should be shutdown. The user name and password must match the values provided here exactly. Exclude the first five addresses from each pool.225. Create a DHCP pool for hosts on VLAN 8 using the pool name vlan8pool. Hosts should be able to ping each other and external hosts after they have been correctly addressed. Configure three DHCP pools as follows:         Refer to the information in the Addressing Table.  Configure the vty lines to only accept SSH connections. All VLAN pool names must match the provided values exactly. Configure user-based authentication for the SSH connections with a user name of netadmin and an encrypted secret password of SSHsecret9. Configure a DNS server address of 192.200. . If all required configurations are complete. 4. Create a DHCP pool for hosts on VLAN 4 using the pool name vlan4pool. All hosts should be able to communication with hosts on other networks. the hosts should be able to ping hosts on other networks. .  Hosts on VLAN 15 should be addressed statically as indicated in the Addressing Table. Last Updated: April.1 and Marvel 2. All rights reserved.2015 Cisco Systems.5 All contents are Copyright © 1992 .0. Once configured.1 Created in Packet Tracer 6. This document is Cisco Public Information. Inc.1. Hosts on the LANs attached to Building 1 should be statically assigned addresses that enable them to communicate with hosts on other networks. as indicated in the Addressing Table. 2015 ID: 1 Version 2.
Copyright © 2024 DOKUMEN.SITE Inc.