Week 2-10 - SRWE Lab - Mock Test - Answer Key
Week 2-10 - SRWE Lab - Mock Test - Answer Key
IP Addressing Table
NOTES: -
1. The ISP side does not have to be configured.
2. IP configuration has already been done for devices working with static
assignment.
3. Configure the Routers using the Laptops connected to them using the
console connection. The default console access password is
‘consoleclass’ and the exec mode password is ‘cisco’.
1. The BranchRouter1 is not being accessed through the default exec mode
password ‘cisco’.
3. Edit the required registries and restore the router configuration from the TFTP
Server located at 192.168.8.2
Once inside the rommon mode. Prepare the BranchRouter1 to bypass the
startup configuration and boot itself from the flash memory.
rommon 1 > confreg 0x2142
After gaining access to the global configuration mode, configure the router to
no-longer bypass the startup configuration.
Router(config) #config-register 0x2102
3. Point the BranchRouter1 to the TACACS+ Server. Use the IP Address from the
IP Addressing scheme and the secret key previously established.
4. Set the AAA authentication parameters on R1 for login. Create a word list
named ‘srwe-revision’. Use the TACACS+ server for authentication.
5. Configure the line console to use the configured TACACS+ Server for the login
authentication.
VALUES VARIABLES
Pool Name REVISION_DHCP_POOL
Network 192.168.1.0 255.255.255.0
Default Router 192.168.1.1
The first 10 useable IP addresses and the last useable
Excluded Addresses
IP address.
BranchRouter1(config) #ip dhcp pool REVISION_DHCP_POOL
BranchRouter1(config-if) #network 192.168.1.0 255.255.255.0
BranchRouter1(config-if) #default-router 192.168.1.1
BranchRouter1(config-if) #exit
BranchRouter1(config) #ip dhcp excluded-address 192.168.1.1 192.168.1.10
BranchRouter1(config) #ip dhcp excluded-address 192.168.1.254
VARIABLES VALUES
Internet Connection Type Automatic Configuration - DHCP
VARIABLES VALUES
Port Status On
SSID SRWE_revision_ap
Channel 11
Authentication WPA2-PSK
Pass Phrase cisco#123
Encryption TIKP
3. Connect the Laptop3 and Laptop4 to the Wireless Access Point and obtain IP
addresses using DHCP. Obtain the IP addresses serially.
g) Configure a Named Standard ACL ‘NSACL’ that denies traffic from the local
network (192.168.1.0) from reaching the VPN Server at 192.168.16.100.
Explicitly permit all other traffic.
h) Configure a Numbered Extended ACL 130 that denies telnet, web, and ping
to the File Server (192.168.8.4) from the local (192.168.1.0) network. Explicitly
permit all other traffic trying to pass through.
j) Configure the Server LAN (192.168.8.0) to work with PAT. For the interesting
traffic use a Numbered Standard ACL 1, implicitly denying all other traffic.
End of Paper !!
Regards