SIC practical print
SIC practical print
Configure Routers
1
ON PC -> CMD
> ping server ip address
1
MD5 (For both the routers)
ROUTER -> CLI
1) enable
2) conf t
3) interface GigabitEthernet0/1
4) ip ospf authentication message-digest
5) ip ospf message-digest-key 1 md5 smile
6) exit
7) show ip ospf interface GigabitEthernet0/1
1
b. NTP.
NTP -: Synchronization
1
4) ntp up (Services up)
5) ntp update-calendar
6) exit
7) show clock
1
Syslog(For both the routers)
1) enable
2) conf t
3) logging 192.168.1.2
4) exit
1
d. To support SSH connections.
SSH -: Secure Shell
Login ID & Password
1
On PC -> CMD
> ssh -l Tyit 192.168.3.1
Enter password: Cisco
1
Practical 2
Configure AAA Authentication
1
1
On Router -> cmd
1) enable
2) conf t
3) aaa new-model
4) tacacs-server host 192.168.2.3 key CISCO
5) radius-server host 192.168.2.2 key CISCO
6) aaa authentication login tyit group tacacs+ group radius local
7) line vty 0 4
8) login authentication tyit
9) exit
1
PC0 - Tacacs (Tacacs ON, Radius OFF) PC1 - Radius (Tacacs OFF, Radius ON)
1
Practical 3
Configuring Extended ACLs
1
1
1
Apply and verify extended ACL
Router -> cli
1) enable
2) conf t
3) access-list 100 permit tcp host 192.168.3.2 host 192.168.1.2 eq ftp
(eq - What services?)
4) interface GigabitEthernet0/1
5) ip access-group 100 out
6) exit
1
Verify
On PC0 -> cmd
1) ftp 192.168.1.2
1
1
Practical 4
Configure IP ACLs to Mitigate Attacks and IPV6 ACLs
Server
1
PC
3 Routers Config
1
1
RIP
1
On PC -> Verify the connectivity
1
On PC -> Verify on CMD
> ssh -l ssh_admin 192.168.3.2
Password: ty
On Server -> Verify on CMD
> ssh -l ssh_admin 192.168.2.1
1
d. Configuring IPv6 ACLs
Router 0:
Router>enable
Router#
Router#configure terminal
Router(config)#ipv6 unicast-routing
Router(config)#interface GigabitEthernet0/0
1
Router(config-if)#ipv6 address 2002::1/64
Router(config-if)#ipv6 rip a enable
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
Router(config)#interface GigabitEthernet0/1
Router(config-if)#ipv6 address 2001::1/64
Router(config-if)#ipv6 rip a enable
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
Router(config)#interface Serial0/1/0
Router(config-if)#ipv6 address 2003::1/64
Router(config-if)#ipv6 rip a enable
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
Router 1:
Router>enable
Router#configure terminal
Router(config)#ipv6 unicast-routing
Router(config)#
Router(config)#interface Serial0/1/0
Router(config-if)#ipv6 address 2003::1/64
Router(config-if)#ipv6 rip a enable
Router(config-if)#no shutdown
Router(config-if)#
Router(config-if)#exit
Router(config)#
Router(config)#interface Serial0/1/1
Router(config-if)#ipv6 address 2004::1/64
Router(config-if)#ipv6 rip a enable
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
1
Router2:
Router>enable
Router#configure terminal
Router(config)#ipv6 unicast-routing
Router(config)#
Router(config)#interface Serial0/1/1
Router(config-if)#ipv6 address 2004::2/64
Router(config-if)#ipv6 rip a enable
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/0
Router(config-if)#ipv6 address 2005::1/64
Router(config-if)#ipv6 rip a enable
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
Enter the following commands in the CLI mode of the Router1 and apply it at
the proper interface:-
Router>enable
Router#configure terminal
Router(config)#ipv6 access-list smile
Router(config-ipv6-acl)#deny tcp any host 2005::2 eq www
Router(config-ipv6-acl)#deny tcp any host 2005::2 eq 443
Router(config-ipv6-acl)#permit ipv6 any any
Router(config-ipv6-acl)#
1
Router(config-ipv6-acl)#exit
Router(config)#
Router(config)#interface Serial0/1/1
Router(config-if)#ipv6 tra c-filter smile in
Router(config-if)#exit
Router(config)#
1
1
Practical 5
Configuring a Zone-Based Policy Firewall
Configuring PC0
1
Configuring server0
1
Configuring Router0
Configuring Router2
Router 1:
1
Router 0:
Router 2:
1
Check the connectivity by pinging the server from the PC
1
Part 2: Configuring SSH on Router 0
Router 0→ CLI
Router#enable
Router#conf t
Router(config)#ip domain-name tyit.com
Router(config)#hostname R0
R2(config)#crypto key generate rsa
R2(config)#line vty 0 4
R2(config-line)#transport input ssh
R2(config-line)#login local
R2(config-line)#exit
R2(config)#username tyit privilege 15 password pass
Next we access the web services of the Server using the web browser of PC
using the following
1
Check whether the securityk9 package exist on Router2 or not by writing the
following command on CLI→
show version
Now check whether the securityk9 package has been installed or not.
Router#
Router#configure terminal
Router(config)#zone security in-zone
Router(config-sec-zone)#exit
Router(config)#zone security out-zone
Router(config-sec-zone)#exit
Router(config)#access-list 101 permit ip 192.168.4.0 0.0.0.255 any
Router(config)#class-map type inspect match-all in-map
Router(config-cmap)#match access-group 101
Router(config-cmap)#exit
Router(config)#policy-map type inspect in-out
Router(config-pmap)#class type inspect in-map
Router(config-pmap-c)#inspect
Router(config-pmap-c)#exit
Router(config-pmap)#exit
Router(config)#zone-pair security in-out-zone source in-zone destination
out-zone
Router(config-sec-zone-pair)#service-policy type inspect in-out
1
Router(config-sec-zone-pair)#exit
Router(config)#
Router(config)#interface GigabitEthernet0/0
Router(config-if)#zone-member security in-
zone Router(config-if)#exit
Router(config)#
Router(config)#interface Serial0/1/1
Router(config-if)#zone-member security out-zone
Router(config-if)#exit
Router(config)#exit
Router#copy running-config startup-config
1
Step 3: Type the following command in the CLI mode of Router1
Router#show policy-map type inspect zone-pair sessions
We will get the following output
Step 4: We close the SSH connection and open the web browser and access the
server
address (192.168.1.2) and get the following
1
Part 5: Testing the Firewall Functionality (from out-zone to in-
zone)by the following steps
Step 1: Ping PC0 from the SERVER (it will result in Failure)
1
Practical 6
Configure IOS Intrusion Prevention System (IPS) Using the
CLI
1
1
1
1
1
Router>enable
Router#show version
Router#conf t
Router(config)#license boot module c1900 technology-package securityk9
Router(config)#exit
Router#reload
####################################################
Router>enable
Router#
Router#show version
🎉securityk9 installed successfully🎉
Router#
Router#clock set 15:40:56 MARCH 5 2024
Router#mkdir smile
Router#configure terminal
Router(config)#ip ips config location flash:smile
Router(config)#ip ips name tyit
Router(config)#ip ips notify log
Router(config)#ip ips signature-category
Router(config-ips-category)#category all
Router(config-ips-category-action)#retired true
Router(config-ips-category-action)#exit
Router(config-ips-category)#category ios_ips basic
Router(config-ips-category-action)#retired false
Router(config-ips-category-action)#exit
Router(config-ips-category)#exit
Router(config)#interface Serial0/1/0
Router(config-if)#ip ips tyit out
Router(config-if)#exit
Router(config)#
1
Router(config-sigdef-sig-status)#exit
Router(config-sigdef-sig)#engine
Router(config-sigdef-sig-engine)#event-action produce-alert
Router(config-sigdef-sig-engine)#event-action deny-packet-inline
Router(config-sigdef-sig-engine)#exit
Router(config-sigdef-sig)#exit
Router(config-sigdef)#exit
Router(config)#exit
1
Practical 7
Layer 2 Security
Add serial interface to cloud and router both ports.. Once the topology is ready
Rename your first switch to switch A
1
Part 1 : Root Bridge is set up
Part 2–Protect Against STP Attack
Redundant links are always welcome in switch topology as they are increasing
the
network’s availability and robustness.
Redundant links, if we look at them from layer 2 perspective, can cause Layer 2
loops.
Switch A Configuration
Switch B Configuration
1
Switch 1 and Switch 2 Same command
Switch 1 and Switch 2 Configuration
1
MultiLayer Switch
Switch B Configuration
1
Checking whether the port security has been enabled or not on both the
Switches
1
Shutting down all the unused ports
1
Practical 8
9
Configure and Verify a Site-to-Site IPsec VPN Using CLI
Configuring PC1
Configuring PC2
1
Configuring Router 0
Configuring Router1
Configuring Router2
1
Part 1: Configuring RIP on each Router
1
Now check the connectivity by ping command
1
Part 2: Configure IPSec Parameters on Router0
Router>enable
Router#configure terminal
Router(config)#license boot module c1900 technology-package securityk9
Router(config)#do write
Router(config)#exit
Router#reload
Router>
Router>enable
Router#show version
Router#configure terminal
Router(config)#access-list 110 permit ip 92.168.1.0 0.0.0.255 192.168.4.0
0.0.0.255
Router(config)#crypto isakmp policy 10
Router(config-isakmp)#encryption aes 256
Router(config-isakmp)#authentication pre-share
Router(config-isakmp)#group 5
Router(config-isakmp)#exit
Router(config)#crypto isakmp key smile1234 address 192.168.3.2
Router(config)#crypto ipsec transform-set vpn-set esp-aes esp-sha-hmac
Router(config)#crypto map vpn-map 10 ipsec-isakmp
Router(config-crypto-map)#set peer 192.168.3.2
Router(config-crypto-map)#set transform-set vpn-set
Router(config-crypto-map)#match address 110
Router(config-crypto-map)#exit
Router(config)#
Router(config)#interface Serial0/1/0
1
Router(config-if)#crypto map vpn-map
Router(config-if)#exit
Router(config)#
Router>enable
Router#configure terminal
Router(config)#license boot module c1900 technology-package securityk9
Router(config)#do write
Router(config)#exit
Router#reload
Router>
Router>enable
Router#show version
Router#
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#access-list 110 permit ip 192.168.4.0 0.0.0.255 192.168.1.0
0.0.0.255
Router(config)#crypto isakmp policy 10
Router(config-isakmp)#encryption aes 256
Router(config-isakmp)#authentication pre-share
Router(config-isakmp)#group 5
Router(config-isakmp)#exit
1
Router(config)#crypto isakmp key smile1234 address 192.168.2.1
Router(config)#crypto ipsec transform-set vpn-set esp-aes esp-sha-hmac
Router(config)#crypto map vpn-set 10 ipsec-isakmp
Router(config-crypto-map)#description vpn
Router(config-crypto-map)#set peer 192.168.2.1
Router(config-crypto-map)#set transform-set vpn-set
Router(config-crypto-map)#match address 110
Router(config-crypto-map)#exit
Router(config)#
Router(config)#interface Serial0/1/1
Router(config-if)#crypto map vpn-set
Router(config-if)#
1
And now we check the Router0 by typing the following Command
1
And now we check the Router0 by typing the following Command
Router#show crypto ipsec sa