0% found this document useful (0 votes)
45 views

Network Integration Challenge Class

The document describes a network topology with multiple routers and switches that need to be configured. Key requirements include setting up VLANs, trunking, routing protocols, DHCP services, and security features like passwords, SSH, and port security on various devices. The goal is to integrate the network components while meeting the security and connectivity requirements.

Uploaded by

Rica Pulongbarit
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views

Network Integration Challenge Class

The document describes a network topology with multiple routers and switches that need to be configured. Key requirements include setting up VLANs, trunking, routing protocols, DHCP services, and security features like passwords, SSH, and port security on various devices. The goal is to integrate the network components while meeting the security and connectivity requirements.

Uploaded by

Rica Pulongbarit
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Network Integration Challenge (D)

ADDRESS TABLE
Device Interface IP Address Subnet Mask Gateway
PURPLE S0/0/0 172.16.0.1 255.255.255.252 N/A

G0/1.13 172.16.13.1 255.255.255.0 N/A

G0/1.99 172.16.99.1 255.255.255.0 N/A

G0/0 192.168.1.1 255.25.255.0 N/A

MAGENTA S0/0/0 172.16.0.2 255.255.255.252 N/A


DCE
G0/1.4 172.16.4.1 255.255.255.0 N/A

G0/1.22 172.16.22.1 255.255.255.0 N/A

G0/0 192.168.5.1 255.255.255.0 N/A

BLUE VLAN 13 172.16.13.50 255.255.255.0 N/A


VLAN 99 172.16.99.74 255.255.255.0 N/A

RED VLAN 4 172.16.4.34 255.255.255.0 N/A


VLAN 22 172.16.22.66 255.255.255.0 N/A

DHCP-A NIC 192.168.5.100 255.255.255.0 192.168.5.1


[Pick the date]

DHCP-B NIC 192.168.1.100 255.255.255.0 192.168.1.1


PC-A NIC DHCP DHCP DHCP
PC-B NIC DHCP DHCP DHCP

VLAN PORT ASSIGNMENT AND DHCP INFORMATION


VLAN VLAN
Device Ports Network
Numbers Name
BLUE F0/1-15 VLAN 13 Gym 172.16.13.0/24
VLAN 99 Management 172.16.99.0/24

RED F0/1-15 VLAN 4 Foundry 172.16.4.0/24


VLAN22 Management 172.16.22.0/24
SCENARIO
In this activity, you will configure VLANs, trunks, port security, DHCP, and OSPFv2.
REQUIREMENTS
Using the information in the topology and tables above, implement the following
requirements:

MAGENTA
• Configure the Hostname
• Disable DNS lookup
• Assign class as the Encrypted privileged EXEC mode password
• Set the MOTD banner to “Magenta is a shade of Purple.”
• Assign cisco as the console password
• Apply IP addresses to the appropriate interfaces
• Configure SSH
• Domain-Name: Crayola.com
• Create a RSA crypto key with 1024 bits
• Create a user named Bob with an encrypted password of cisco
• Enable SSH only
• Enable SSH Version 2
• Configure Single Area OSPFv2
• Process ID 15
• Area 30
• Router ID: 5.5.5.5
• Advertise all networks
• Apply passive interface on appropriate interface
• Set idle time out to 2 min. and 30 secs. on console and VTY lines
• Encrypt plain text passwords

1
[Pick the date]

DHCP – A
• Set Static IP address, subnet mask, and Default Gateway
• (Use address table from above)
• Enable the DHCP Service
• Pool Name: Foundry
• Set the Default Gateway for the Foundry Network
• Set the DNS Server to 8.8.8.8
• Use the Foundry Network for your DHCP Server A
• Exclude the first 99 Usable IP addresses
• Set the Subnet Mask
• Set the Maximum Users to 100

RED
• Configure the Hostname
• Disable DNS lookup
• Assign class as the Encrypted privileged EXEC mode password
• Set the MOTD banner to “Red and Blue make Magenta.”
• Assign cisco as the console and VTY password
• Apply IP addresses to the appropriate interfaces
• Set the default gateway
• Create, configure, name, and assign VLANs
• Configure trunking
• Configure all port as access ports except the trunk port
• Configure port security on all FastEthernet ports
▪ Set maximum allowed MAC address to 5
▪ Set interfaces to acquire MAC and store in running-config
• Disable all unused interfaces
• Encrypt plain text passwords

PURPLE
• Configure the Hostname
• Disable DNS lookup
• Assign class as the Encrypted privileged EXEC mode password
• Set the MOTD banner to “Purple is not a primary color.”
• Assign cisco as the console and VTY password
• Configure inter-vlan routing and all other interfaces
• Block brute force attacks for 60 secs. When 3 attempts are within 30 secs.
• Enable Telnet
• Configure Single-Area OSPFv2
▪ Process ID 15
▪ Area 30
▪ Router ID: 9.9.9.9
▪ Advertise all networks
▪ Apply passive interface on appropriate interface
• Set minimum password length to 5
• Encrypt plain text passwords

2
[Pick the date]

DHCP – B
• Set Static IP address, subnet mask, and Default Gateway
• (Use address table from above)
• Pool Name: Gym
• Set the Default Gateway for the Gym Network
• Set the DNS Server to 8.8.8.8
• Use the Gym Network for your DHCP Server B
• Exclude the first 99 Usable IP addresses
• Set the Subnet Mask
• Set the Maximum Users to 100

BLUE
• Configure the Hostname
• Disable DNS lookup
• Assign class as the privileged EXEC mode password
• Set the MOTD banner to “Blue and Red makes Purple.”
• Assign cisco as the console and VTY password
• Apply IP addresses to the appropriate interfaces
• Set the default gateway
• Create, configure, name, and assign VLANs
▪ Set all appropriate port as access ports
• Configure trunking
• Configure port security on all ports EXCEPT trunk port
▪ Set maximum allowed MAC address to 3
• Encrypt plain text passwords

Verification
• Verify you have the correct IP addresses on PC-A and PC-B
• Verify you can ping from PC-A to PC-B
• Verify you can Ping from PC-B to PC-A
• Ping should be successful, if not troubleshoot
• PC-A and PC-B

o C:\>ssh –l bob 172.16.0.2 (should be successful)

3
[Pick the date]

You might also like