SEC450 W2 DFiLab Worksheet-2
SEC450 W2 DFiLab Worksheet-2
David M. Fontanez
Date
In the CLI window for the ISP router, execute the commands to verify the settings on the
interfaces and display the routing table. Note: Use show ip interface brief to check the interfaces.
Paste the Virtual CLI show ip interface brief and show ip route commands Here
ISP_Router>enable
ISP_Router#show ip interface brief
Interface
IP Address
OK? Method Status
FastEthernet0/0
200.100.0.1
YES NVRAM
up
FastEthernet1/0
200.100.40.1 YES NVRAM
up
Serial0/0
200.100.10.1 YES NVRAM
up
Serial0/1
200.100.20.1 YES NVRAM
up
ISP_Router#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2
* - candidate default
Gateway of last resort is not set
Displaying routing table from result of Operational table
R
R
C
C
C
C
Complete the table below based on the dynamic routes displayed in the routing table:
Routing protocol
RIP
RIP
Destination Network
192.168.100.0
192.168.200.0
Metric
120/1
120/1
Outbound Interface
Serial0/0
Serial0/1
Verify Connectivity between the ISP Router and the Dallas and Chicago Host and Server PCs by
pinging their IP addresses from the Virtual CLI.
Select the Task 1 commands in the Virtual CLI using the mouse. Click on the Copy button.
Use <Ctrl>V to paste the commands into your Lab Document.
Open the Permitted services links Public_Server->Dallas_Host and Public_Server>Dallas_Server. Note the TCP and UDP port numbers that are open. Use <Alt><PrtSc> to
capture the Public_Server->Dallas_Host and the Public_Server->Dallas_Server windows
and use <Ctrl>V to paste the two captured windows into the table cells below:
What are the UDP and TCP ports that are permitted in traffic from the Public_Server to the
Dallas_Host? What are the UDP and TCP ports that are permitted in traffic from the Public_Server to
the Dallas_Server?
Destination
Dallas_Host
Dallas_Server
1-65535
1-65535
1-65535
1-65535
Open the Permitted services links Public_Server->Dallas_Host and Public_Server>Dallas_Server. Note the TCP and UDP port numbers that are now open. Use <Alt><PrtSc> to
capture the Public_Server->Dallas_Host and the Public_Server->Dallas_Server windows and
use <Ctrl>V to paste the two captured windows into the table cells below:
What are the UDP and TCP ports that are now permitted in traffic from the Public_Server to the
Dallas_Host? What are the UDP and TCP ports that are permitted in traffic from the Public_Server
to the Dallas_Server?
Destination
Dallas_Host
Dallas_Server
0-65535
0-65535
0-255
0-255
Explain the differences between the UDP/TCP Ports tables before and after the ACL has been
applied. Explain what affect this ACL has on Security for the Dallas Server?
Basically, it increase the security by blocking unnecessary ports that are vulnerable to attack.