17.8.2 Packet Tracer Skills Integration Challenge
17.8.2 Packet Tracer Skills Integration Challenge
Tutor
Septiembre de 2021
2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 3 www.netacad.com
Packet Tracer – Skills Integration Challenge
Addressing Table
S1 VLAN 1
S2 VLAN 1
S3 VLAN 1
Staff NIC
Staff NIC 2001:db8:acad::2/64 fe80::1
Staff NIC fe80::2 fe80::1
Sales NIC
2001:db8:acad:1::2/64 fe80::1
fe80::2
IT NIC
IT NIC 2001:db8:acad:2::2/64 fe80::1
IT NIC fe80::2 fe80::1
2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 3 www.netacad.com
Packet Tracer – Skills Integration Challenge
Background / Scenario
The router Central, ISP cluster, and the Web server are completely configured. You must create a new IPv4 addressing
scheme that will accommodate 4 subnets using the 192.168.0.0/24 network. The IT department requires 25 hosts. The
Sales department needs 50 hosts. The subnet for the rest of the staff requires 100 hosts. A Guest subnet will be added in
the future to accommodate 25 hosts. You must also finish the basic security settings and interface configurations on R1.
Then, you will configure the SVI interface and basic security settings on switches S1, S2, and S3.
Instructions
IPv4 Addressing
Use 192.168.0.0/24 to create subnets that meet the host requirements.
o Staff: 100 hosts
o Sales: 50 hosts
o IT: 25 hosts
o Guest network to be added later: 25 hosts
Document the IPv4 addresses that have been assigned in the Addressing Table.
Record the subnet for the Guest network:
PC Configurations
Configure the assigned IPv4 address, subnet mask, and default gateway settings on the Staff, Sales, and IT PCs
using your addressing scheme.
Assign the IPv6 unicast and link local addresses and default gateways to the Staff, Sales, and IT networks
according to the Addressing Table.
R1 Configurations
Configure the device name according to the Addressing Table.
Disable DNS lookup.
Assign Ciscoenpa55 as the encrypted privileged EXEC mode password.
Assign Ciscoconpa55 as the console password and enable login.
Require that a minimum of 10 characters be used for all passwords.
Encrypt all plaintext passwords.
Create a banner that warns anyone accessing the device that unauthorized access is prohibited.
Configure and enable all the Gigabit Ethernet interfaces.
o Configure the IPv4 addresses according to your addressing scheme.
o Configure the IPv6 addresses according to the Addressing Table.
2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 3 www.netacad.com
Configure SSH on R1:
o Set the domain name to CCNA-lab.com
o Generate a 1024-bit RSA key.
o Configure the VTY lines for SSH access.
o Use the local user profiles for authentication.
o Create a user Admin1 with a privilege level of 15 and use the encrypted password of Admin1pa55.
Configure the console and VTY lines to log out after five minutes of inactivity.
Block anyone for three minutes who fails to log in after four attempts within a two-minute period.
Switch Configuration
Configure the device name according to the Addressing Table.
Configure the SVI interface with the IPv4 address and subnet mask according your addressing scheme.
Configure the default gateway.
Disable DNS lookup.
Assign Ciscoenpa55 as the encrypted privileged EXEC mode password.
Assign Ciscoconpa55 as the console password and enable login.
Configure the console and VTY lines to log out after five minutes of inactivity.
Encrypt all plaintext passwords.
Connectivity Requirements
Use the web browser on the Staff, Sales, and IT PCs to navigate to www.cisco.pka.
Use the web browser on the Staff, Sales, and IT PCs to navigate to www.cisco6.pka.
All PCs should be able to ping all other the devices.