0% found this document useful (0 votes)
3 views

ISPractical 1

The document outlines a practical assignment for configuring routers in an Information Security course. It includes tasks such as setting up OSPF MD5 authentication, NTP, logging to a SYSLOG server, and supporting SSH connections. Detailed steps for assigning IP addresses, configuring routers, and verifying settings are provided for each task.

Uploaded by

itskrp29
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

ISPractical 1

The document outlines a practical assignment for configuring routers in an Information Security course. It includes tasks such as setting up OSPF MD5 authentication, NTP, logging to a SYSLOG server, and supporting SSH connections. Detailed steps for assigning IP addresses, configuring routers, and verifying settings are provided for each task.

Uploaded by

itskrp29
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

Name: Komal Pawar Subject: Information Security

Roll No.: 22064 Sem: VI


Class: TYBSc IT Date:

Practical 1
Aim: Configure Routers:
a. OSPF MD5 Authentication
b. NTP
c. To log messages to the SYSLOG server
d. To support SSH connections

⮚ Topology Diagram

⮚ Assigning IP Addresses
1. NTP Server
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:

2. SYSLOG Server

3. PC-0

4. Router 0
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:

5. Router 1

6. Router 2

⮚ Displaying IP Address Details of Routers


1. Router 0

2. Router 1
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:

3. Router 2

⮚ Configure OSPF on routes


1. Router 0

2. Router 1
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:

3. Router 2

⮚ Displaying routing table of routers


1. Router 0

2. Router 1
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:

3. Router 2

A. OSPF MD5 Authentication


⮚ Configure OSPF MD5 authentication on routers
1. Router 0
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:

2. Router 1

3. Router 2

⮚ Configure the MD5 key for all the routers


1. Router 0

2. Router 1
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:

3. Router 2

⮚ Displaying OSPF details of all the routers


1. Router 0

2. Router 1
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:

3. Router 2

B. NTP
⮚ Check Clock Time in the routers
1. Router 0

2. Router 1

3. Router 2
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:

⮚ Configure NTP Server


Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:

⮚ Configure NTP Client


1. Router 0
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:

2. Router 1

3. Router 2

⮚ Configure NTP authentication and to timestamp log messages on the


routers
1. Router 0
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:

2. Router 1

3. Router 2

⮚ Check updated UTC Clock Time in the routers


1. Router 0

2. Router 1

3. Router 2
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:

C. SYSLOG
⮚ Configure routers to log messages to the SYSLOG server
1. Router 0

2. Router 1

3. Router 2
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:

⮚ Verify logging configuration on routers


1. Router 0

2. Router 1
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:

3. Router 2

⮚ Examine logs of the SYSLOG server


Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:

D. SSH
⮚ Configure SSH on R2

⮚ Connect to R2 using telnet and SSH on PC


Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:
Name: Komal Pawar Subject: Information Security
Roll No.: 22064 Sem: VI
Class: TYBSc IT Date:

You might also like