Lab 5 Ch-2 & 3 - Switch Security Part B - Apr18 - 2013
Lab 5 Ch-2 & 3 - Switch Security Part B - Apr18 - 2013
Algonquin
1.
Cabling (lab T113) DO NOT connect any switch ports YET!!! a. Connect your lab PC COMM port cable to various switch and router consol ports as necessary to perform configurations. b. Clear any existing switch & router configurations (details Lab 2.5.1, Appendix 1). c. Now cable the rest entire topology per the above diagram. Router configuration: Note cable your Pod racks: (bottom rack switch) via the Yellow lab network rather than the Red at the patch panel. This connects to the instructor-supplied router: T113-Yellow-Net providing ALG-Net connectivity via a local NAT. a. Download router configuration files from Blackboard for your particular T113 lab Pod #
Page 1 of
2.
CST6474
i. ii.
Algonquin
Please note each group of students using a Pod must use a unique IP subnet. Note your Pod # in the topology diagram, and download from Blackboard the correct router config files. b. Upload the correct files to the correct routers for your lab equipment c. Verify R1, 2, can ping: - 172. X7.99.1 (X your Pod #) OK? ___. - 10.50.13.1 OK? ___. d. Verify R2 gets all routing table routes for all VLAN subnets and links: R2#sho ip route Gateway of last resort is 172.17.9.254 to network 0.0.0.0 C R C R R R* 172.17.0.0/24 is subnetted, 8 subnets 172.17.1.0 is directly connected, Serial0/1 172.17.3.0 [120/1] via 172.17.2.2, 00:00:13, Serial0/1 172.17.9.0 is directly connected, FastEthernet0/0 172.17.10.0 [120/1] via 172.17.1.1, 00:00:07, Serial0/1 172.17.20.0 [120/1] via 172.17.1.1, 00:00:07, Serial0/1 0.0.0.0/0 [120/1] via 172.17.9.254, 00:00:05, FastEthernet0/0 i. 3. Troubleshoot with instructor support as needed. OK? ___.
Initial Switch Configuration use your Lab 3.5.1 switch S1, S2: a. Edit all switch config files: i. Add VLAN 99: before the first interface line add the line: vlan 99 ii. Change the second octet of your SVI IP address after interface vlan 99 to correspond to your lab equipment Pod # as per: Pod S1 Config: S2 Config: # IP Addr IP Addr 172. 1 7. 99. 172. 17. 99. 12 1 2 3 4 5 6
11 172. 27. 99. 11 172. 37. 99. 11 172. 47. 99. 11 172. 57. 99. 11 172. 67. 99. 11 172. 27. 99. 12 172. 37. 99. 12 172. 47. 99. 12 172. 57. 99. 12 172. 67. 99. 12
iii. Add a line: no shutdown after your line: ip address 172. swi trunk encap dot1q b. Upload your switch config files to your respective switches: S1, S2, interface range fa0/1 24 no shut interface range gi0/1 2 note in PT its: gi1/1-2 switchport access vlan 99 no shut Verify switch connectivity to all neighbour switch SVIs (see IP table above), OK? ___. You will not have switch connectivity to other VLANs nor the routers as the switches SVIs on VLAN-99 are not connected to their default gateway in R3 (later Step-6).
Page 2 of
c. Enable all ports on all switches, and assign GigE ports to VLAN 99:
d. e.
CST6474
4.
Algonquin
Workstation configuration: R2 has a DHCP server for PCs on their different VLANs a. Verify that the workstations: i. received an IP address and can ping 172.17.9.254 ii. receive a default gateway and DNS address and can surf ALG-Net (note slow performance through serial WAN links) Configure S1 VTY lines for SSH only, max 4 sessions: a. This configuration is somewhat cookbook: S(config)# username ciscoccna password cisco S(config)# ip domain-name example.com S(config)# crypto key zeroize <- clears out previous crypto IPSec RSA Keys S(config)# crypto key generate rsa <- for sshv2, keylength MUST be 1024 (min) S(config)# ip ssh version 2 S(config)# line vty 0 3 S(config)# login local <- uses above username/pw local to this router S(config)# transport input SSH Verify SSH vty access from a PC using Putty connected to a switchport on VLAN-99
5.
6. 7.
Configure DHCP Snooping for the DHCP server ingress ports for VLAN 10 only. a. Again somewhat cookbook: ip dhcp snooping <- turn on feature ip dhcp snooping vlan 10 <- activate on VLAN 10 only no ip dhcp snooping information option <- for remote DHCP server support inter range fa0/11, fa0/18 ports ip dhcp snooping trust inter range fa0/6-24
ip dhcp snooping limit rate 100
8.
9.
Set up ARP spoofing (or ARP poisoning) attack mitigation on VLAN 10 only: a. ip arp inspection vlan 10 b. inter ra fa0/11, fa0/18 c. ip arp inspection trust Copy switch status for all switches to a text file, plus your PT Topology files for each VLAN, and upload to BBrd for this lab completion delivery: a. Show ip interface brief b. Show vlan c. Show ip dhcp snooping d. Show run
10.
Page 3 of