ISPractical 1
ISPractical 1
Practical 1
Aim: Configure Routers:
a. OSPF MD5 Authentication
b. NTP
c. To log messages to the SYSLOG server
d. To support SSH connections
⮚ Topology Diagram
⮚ Assigning IP Addresses
1. NTP Server
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:
2. SYSLOG Server
3. PC-0
4. Router 0
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:
5. Router 1
6. Router 2
2. Router 1
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:
3. Router 2
2. Router 1
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:
3. Router 2
2. Router 1
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:
3. Router 2
2. Router 1
3. Router 2
2. Router 1
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:
3. Router 2
2. Router 1
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:
3. Router 2
B. NTP
⮚ Check Clock Time in the routers
1. Router 0
2. Router 1
3. Router 2
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:
2. Router 1
3. Router 2
2. Router 1
3. Router 2
2. Router 1
3. Router 2
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:
C. SYSLOG
⮚ Configure routers to log messages to the SYSLOG server
1. Router 0
2. Router 1
3. Router 2
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:
2. Router 1
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:
3. Router 2
D. SSH
⮚ Configure SSH on R2