100% found this document useful (1 vote)
361 views4 pages

Maquette Cisco

The document provides instructions over 9 steps to configure networking devices and services, including: configuring IP addresses and interfaces on devices; enabling VLANs, trunks and interfaces on switches; configuring routing protocols OSPF and OSPFv3 between routers; setting up DHCP and NAT services on a router; applying access control lists to filter traffic; and securing device access with passwords, banners and login profiles.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
361 views4 pages

Maquette Cisco

The document provides instructions over 9 steps to configure networking devices and services, including: configuring IP addresses and interfaces on devices; enabling VLANs, trunks and interfaces on switches; configuring routing protocols OSPF and OSPFv3 between routers; setting up DHCP and NAT services on a router; applying access control lists to filter traffic; and securing device access with passwords, banners and login profiles.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 4

Step 1

------------
Using the address information in the topology diagram configure:
- Web Server:
ip address - 192.168.35.252
subnet mask - 255.255.255.0
gateway - 192.168.35.1
DNS server - 192.168.35.253
- DNS Server:
ip address - 192.168.35.253
subnet mask - 255.255.255.0
gateway - 192.168.35.1
DNS server - 127.0.0.1
- PC-Admin:
ip address - 192.168.88.10
subnet mask - 255.255.255.0
gateway - 192.168.88.1
DNS server - 192.168.35.253
Step 2
------------
Using the information in topology diagram configure
S1, S2, S3 with the following initial settings:
1. hostname
2. vlans and vlan names
3. trunks (allowed vlans, and native vlan)
- S1, S2, S3 VLANs allowed: 15, 25, 35, 88, 98, native: 98
4. access switchports with vlans
5. shutdown unused switchports
6. the management interface vlan 88 with an ip address
7. use the planned R1 address 192.168.88.1 as the default gateway
Step 3
------------
Using the address information in the topology diagram configure
R1, R2, R3 with the following initial settings:
1. hostname,
2. interface addresses and subnet masks R1, R2, R3
R1 s0/0/0: clock rate 2000000
R2 s0/0/1: clock rate 128000
3. R1 g0/0 & R3 g0/1
- sub-interface addressing and 802.1q encapsulation
*note: when configuring sub-interfaces you need to enable the physical inter
face
4. Enable IPv6 routing on R2 and R3
5. R2 s0/1/0 and s0/0/1 - IPv6 addressing (see topology diagram)
R3 g0/0 and s0/0/1 - IPv6 addressing (see topology diagram)
6. R3 loopback interfaces with ip addresses
Step 4
------------
1. Configure R1 as a DHCPv4 server:
Create a dhcp pool named POOL15 for the 192.168.15.0/24 network
Create a dhcp pool named POOL25 for the 192.168.25.0/24 network
exclude the first 5 addresses in both pools
the dhcp pools will need:
- network and mask
- default-router
- dns-server
2. Enable the DHCPv4 clients on PC1 and PC2 to verify the dhcp server is working
3. Configure R3 as a stateless DHCPv6 server:
create a ipv6 dhcp pool named POOLIPV6
provide dns-server information: 2001:DB8:2323:E::1
*note: DHCPv6 needs to be applied to the interface and the
nd other-config-flag will need to be set for stateless DHCPv6
4. Enable the DHCPv6 client on PC4 to verify that SLAAC and the
DHCPv6 server is working.
5. *Note: sometimes you need to toggle the DHCPv4 and v6 client settings
on and off to get them to work correctly and pick up addressing informatio
n
Step 5
-------------
Configure single area OSPFv2 on R1, R2, R3
R1
ospf process id 1
router-id 1.1.1.1
networks all (area 0)
do not send router advertisements out of all LAN interfaces
set serial 0/0/0 bandwidth to 1544 kilobits per second
R2
first create a default route on R2 out of s0/1/0
ospf process id 1
router-id 2.2.2.2
networks 192.168.5.0 and 192.168.5.4 (area 0)
do not send router advertisements out of s0/1/0 interface
advertise the default route to other OSPF routers
set serial 0/0/0 bandwidth to 1544 kilobits per second
set serial 0/0/1 bandwidth to 128 kilobits per second
R3
ospf process id 1
router-id 3.3.3.3
networks all (area 0) except use a single summary route for the loopback network
s
do not send router advertisements out of all LAN interfaces
do not send router advertisements out of all loopback interfaces
set serial 0/0/1 bandwidth to 128 kilobits per second
Step 6
---------------------
configure OSPFv3 on R2 and R3
R3
ipv6 ospf process id 10
router-id 3.3.3.3
passive-interfaces on g0/0 and g0/1
configure s0/0/1 and g0/0 with ipv6 ospf 10 area 0
configure an ipv6 ::/0 default route out s0/0/1
R2
ipv6 ospf process id 10
router-id 2.2.2.2
passive interfaces on s0/0/0 and s0/1/0
configure s0/0/1 with ipv6 ospf 10 area 0
configure an ipv6 ::/0 default route out s0/1/0
*note: You should be able to ping the Initech Server IPv6 address from PC4.
If you are unable to ping Initech, double check your interface and OSPFv3 s
ettings and
do a clear ipv6 ospf process command on R2 and R3
Step 7
---------------------
Configure static and dynamic NAT on R2.
1. Configure a static nat rule:
- translating global 209.165.201.65 to the local web server at 192.168.35.25
2
2. Configure int s0/1/0 as the outside NAT interface
3. Configure int s0/0/0 and s0/0/1 as the inside NAT interfaces
4. Configure a NAT pool named R2NATPOOL for:
209.165.201.66 through 209.165.201.69
make the netmask as close as possible to masking just those addresses
5. Configure access-list 15 to permit the 192.168.15.0/24 network
6. Configure access-list 25 to permit the 192.168.25.0/24 network
7. Create two separate dynamic NAT rules:
- "ip nat inside" that maps access-list 15 to the nat pool with overload
- "ip nat inside" that maps access-list 25 to the nat pool with overload
Step 8
---------------------
Configure access lists on R2 to limit outside access into the network
1. configure an extended access-list 100 to achieve the following goals (3 lines
only):
- from the outside permit port 80 access to the web server
- from the outside permit pings that were initiated from within the network
only
- permit "established" web page requests generated from within the network o
nly
(you will need to use the established keyword at the end of the line)
- deny all other kinds of communication from outside the network
2. configure an IPv6 access-list FIREWALL-IPV6 to achieve the following goals (2
lines only):
- from the outside permit pings that were initiated from within the network
only
- permit "established" web page requests generated from within the network o
nly
(you will need to use the established keyword at the end of the line)
- deny all other kinds of communication from outside the network
Step 9
---------------------
Configure the following on R3:
- password min length 10 characters
- encrypt all passwords
- banner motd "No unauthorized access allowed!"
- administrative user account:
username: admin,
secret pass: danscourses
- enable secret: class12345
- named access-list ADMIN-MGT
permit only host PC-Admin remote Telnet access
- console 0 and vty 0 4:
use local database for logins,
timeout after 5 min
apply ADMIN-MGT access-list to vty
- save running-config to startup-config

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy