Sic Practical
Sic Practical
Configuring PC0
Configuring PC1
Configuring NTP server/server0
R1(config)#line vty 0 4
*Apr 3 9:19:58.401: RSA key size needs to be at least 768 bits for ssh version 2
*Apr 3 9:19:58.401: %SSH-5-ENABLED: SSH 1.5 has been enabled
R1(config-line)#transport input ssh
R1(config-line)#login local
R1(config-line)#exit
R1(config)#username vaishnavi privilege 15 password abc
Practical No. 3
Configure AAA Authentication on Cisco Routers
Topology :
Configuring PC0 :
Configuring PC1 :
Configuring Router0 :
In order to authenticate the RADIUS server we need to turn OFF the TACACS service
We again enter the command telnet 192.168.2.1 (the Router IP) and enter the username and
password pf the RADIUS server username : laugh & password : laugh we
get the following
The local login can also be verified by turning OFF both TACACS & RADIUS service. The
username & password are both cisco (by default)
Hence the authentication through both TACACS & RADIUS
Practical No. 2
Configure ACLs
Topology :
Configuring Server0 :
Configuring Server1 :
Configuring PC0 :
Configuring PC1 :
Configuring Router0:
Configuring Router1 :
Setting the RIP protocol on both the Routers :
Check the connectivity by using the ping command
Now verify the ftp ( ftp 192.168.1.2) command from both the PCs,one would be
successful (PC0) and other (PC1) would fail
Part 2 : Configure, Apply and Verify an Extended Named ACL
We use the same topology for this case
Type the following command in the CLI mode of Router1
Router>en
Router#conf t
Router(config)#ip access-list extended yash
Router(config-ext-nacl)#permit tcp host 192.168.3.3 host 192.168.1.3 eq www
Router(config-ext-nacl)#exit
Router(config)#interface GigabitEthernet0/0
Router(config-if)#ip access-group yash out
Router(config-if)#exit
Now verify the www ( 192.168.1.3) command from both the PCs browser,one would
be successful (PC1) and other (PC0) would fail
Hence Extended Numbered ACLs as well as Extended Named ACLs have been
verified
Practical no. 4
Configure IP ACLs to Mitigate Attacks.
Topology:
Configuring PC0 :
Configuring PC1 :
Configuring Server0 :
For setting the ipv6 addresses we need to use CLI mode each Router as
Configuring Router0:
Router>
Router>en
Router#conf t
Router(config)#ipv6 unicast-routing
Router(config)#interface GigabitEthernet0/0
Router(config-if)#ipv6 address 2001::1/64
Router(config-if)#ipv6 rip a enable
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
Router(config)#interface GigabitEthernet0/1
Router(config-if)#ipv6 address 2002::1/64
Router(config-if)#ipv6 rip a enable
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
Router(config)#interface Serial0/1/0
Router(config-if)#ipv6 address 2003::1/64
Router(config-if)#ipv6 rip a enable
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
Configuring Router1:
Router>
Router>en
Router#conf t
Router(config)#ipv6 unicast-routing
Router(config)#interface Serial0/1/0
Router(config-if)#ipv6 address 2003::2/64
Router(config-if)#ipv6 rip a enable
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
Router(config)#interface Serial0/1/1
Router(config-if)#ipv6 address 2004::1/64
Router(config-if)#ipv6 rip a enable
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
Configuring Router2:
Router>
Router>en
Router#conf t
Router(config)#ipv6 unicast-routing
Router(config)#interface Serial0/1/0
Router(config-if)#ipv6 address 2004::2/64
Router(config-if)#ipv6 rip a enable
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
Router(config)#interface GigabitEthernet0/0
Router(config-if)#ipv6 address 2005::1/64
Router(config-if)#ipv6 rip a enable
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#exit
Check the connectivity by pinging from both the PC to Server
Connection is successful between PCs to server
We configure the ACLs & apply to the Router1 with the following conditions
We verify the configuration by first accessing the www service from the browser of both
PCs and the get failure
Next we verify whether the ipv6 protocol works by pinging server from any of the PC ( it
must be successful)
Hence the given ACLs have been applied and verified on host running on ipv6
protocol.
Practical no. 5
Configuring a Zone-Based policy Firewall (ZPF)
Topology :
Configuring Server0 :
Configuring PC0 :
Configuring Router0 :
Configuring Router1 :
Configuring Router2 :
Part 1 : Static Routing to each router ( To add routing path )
Note : Before that check the version of your router and see security package is enabled or not
if not enabled, to enable the security feature, type the following command in Router 2
Router>en
Router#conf t
Router(config)#license boot module c1900 technology-package securityk9
ACCEPT? [yes/no]: yes
Router(config)#exit
Router#reload
Router>en
Router#show version
We will get a message informing whether the security package is enabled or not
As you can see above security package is not enabled
Type the following commands in the CLI mode of Router2 which is connected with PC0
Router>
Router>en
Router#conf t
Router(config)#zone security in-zone
Router(config-sec-zone)#exit
Router(config)#interface Serial0/1/0
Router(config-if)#zone-member security out-zone
Router(config-if)#exit
Router(config)#exit
Router#